Search results

Jump to navigation Jump to search
  • ===Use Cases=== *[[Emergency Contact Information Use Case]]
    5 KB (788 words) - 16:34, 16 April 2019
  • ...s this plan lays out how to address specific community needs for security, privacy, interoperability and user experience. It is expected that all communities ...nd best practices to manage cybersecurity-related risk. One example of the use of vertical industry profiles of this framework may be found by following t
    7 KB (988 words) - 21:22, 15 December 2018
  • # Creation of a profile for the use of the [[UXC NSTIC Principles]] in the US Healthcare community. ...it has been tried. (It has only worked where some enterprise required its use.)
    18 KB (2,580 words) - 18:52, 7 December 2020
  • ==Full Title of Use Case== ...patient with a trusted identity which confirms that they subscribe to the privacy regulations of the trust provider.
    5 KB (825 words) - 17:21, 3 May 2019
  • '''Use Case Description''': ...pseudonymous identity, match names between systems, verify attributes with privacy protection]
    858 bytes (99 words) - 18:49, 27 September 2019
  • Use cases for Consideration January 10, 2017 Foundation for Use Case Development: IDESG Guiding Principles and Platform Services
    3 KB (399 words) - 18:50, 13 May 2020
  • ...t have established a repertory of regulations and guidelines that focus on privacy and seek to achieve two sets of goals that create tension among designers a There are a variety of use cases that most of us experience on a steady basis that need to establish as user
    12 KB (2,064 words) - 19:21, 28 May 2020
  • Privacy, Trust/Assurance, Interoperability ==When to use this Pattern (Context)==
    11 KB (1,838 words) - 16:48, 19 January 2016
  • In some ways this is similar to existing use case that discuss privacy enhancing technology, but the purpose is quite different. Privacy, Trust/Assurance, Interoperability
    9 KB (1,467 words) - 20:46, 9 September 2018
  • # The user gets to select which of their identifiers they wish to use with the web site. *Regulatory and commercial pressures on Web Site to increase user privacy are mounting.
    13 KB (2,151 words) - 00:14, 30 October 2020
  • In some ways this is similar to the existing use case that discusses privacy enhancing technology, but the purpose of the pattern is limited to the attr Privacy, Trust/Assurance, Interoperability
    17 KB (2,712 words) - 19:20, 28 November 2021
  • ** The report on '''The Secretive Company That Might End Privacy as we Know it''' received more reader attention than any reports on the Im ...s Act Final Rule] which supports seamless and secure access, exchange, and use of electronic health information
    15 KB (2,350 words) - 01:41, 1 October 2021
  • ...fact that many people do. We have seen many cases, and one of the symbolic cases is the death of a 23-year-old reality TV actress who was stormed by a mob o ...start with, this will likely enlarge the gap. This is what we know of as “Privacy Invasion”. It makes this person less happy.
    31 KB (5,332 words) - 04:35, 27 November 2023
  • **This includes comments relating to the economic, privacy, security, environmental, energy, or federalism impacts that might result f ...cument on [[Mobile Driver's License]] for a view that includes issues like privacy and consent, which are not addressed here.
    30 KB (4,866 words) - 16:56, 9 June 2021
  • ...iving care and the one that "owns" the rights to the information. (In some cases the patient allows other users access to their PHI.) ===Identifers use within the Ecosystem===
    20 KB (3,074 words) - 22:40, 21 March 2021

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)