We've talked about our needs to provide reasonable protection
for verbal, paper and electronic PHI content. Another critter we need to
wrestle with is how do we handle at least two families of e-mail? One set
is that which is used in a legitimate exchange between ourselves and our
business associates and providers. These audiences will likely have varied
levels of security sophistication at their end. The second group is the
internal 'use' by the gossip hotline, where members of the workforce are sharing
sensitive stuff with their pals, because they can..... Other than having a
strong personal accountability policy, has anyone considered other
solutions? Thx - b
********************************************************************** To be removed from this list, go to: http://snip.wedi.org/unsubscribe.cfm?list=privacy and enter your email address. |
- Re: Securing E-mail Bill Bernath
- Re: Securing E-mail Chris Riley
- RE: Securing E-mail Buthod, Tomese
- RE: Securing E-mail Kelly, Lee
- RE: Securing E-mail Holman, Lisa A.
- RE: Securing E-mail Clay III, Roy G. (MCLNO)
- RE: Securing E-mail Leslie C. Bender
- Re: Securing E-mail Total Enterprise Security Solutions
