Skip to main content

Rick Kam

Rick Kam

Rick Kam, CIPP/US, is president and co-founder of ID Experts.

By Rick Kam | 09:28 am | October 19, 2015
The days of James Bond and his world-saving exploits are over. In today's reality, nation-states and their criminal partners can disrupt commerce and defenses in the free world from the safety and comfort of their computer desks.
By Rick Kam | 09:04 am | September 26, 2014
CISO survival guide: Tactics for easing the transition to risk management in ways that succeed for both the company and your own career.
By Rick Kam | 09:48 am | August 14, 2013
Healthcare organizations need to plan for security in the transmission, storage, and use of potentially massive amounts and new kinds of data that devices such as Google Glass will create, and that includes educating patients that data thieves may be lurking behind free health applications.
By Rick Kam | 10:12 am | April 09, 2013
The missing ingredient in many PHI privacy and security efforts? The patient. Rick Kam offers suggestions on how to change that.
By Rick Kam | 09:38 am | July 30, 2012
When it comes to protecting patient health information, it's what's lacking that matters most. The forthcoming Health Information Privacy Bill of Rights might help.
By Rick Kam | 09:44 am | June 18, 2012
With mobile devices growing in number and scope, the risks they present are, too. Covered entities can, and must, commit to protecting patients' privacy.
By Rick Kam | 11:59 am | May 02, 2012
When putting protected health information into the cloud, healthcare organizations need to consider the legal liabilities. That starts with controlling your response to data breaches, and includes an incident response plan.
By Rick Kam | 12:36 pm | April 10, 2012
Safeguarding protected health information is getting thornier, and new federal initiatives not only crack down on HIPAA covered entities but also extend the reach of their responsibility for protecting such data into trading partners. Here's what you need to know about your business associates security practices.