Chief Data Scientist @Channel4. Former CTO of Big Health/Sleepio, co-founder Memrise, data scientist, neuroscientist
From Part 1, you have a sense of what data you need to protect and how to assess risk. Part 2 discussed documentation requirements.
From Part 1, you have a sense of what counts as Protected Health Information (PHI) and how to conduct a Risk Assessment to understand the risks to those data.
I can still fondly remember when I thought a HIPAA was the most dangerous animal…