Privacy / Security
Government & Legislation
American Hospital Association (AMA) Testimony
Bill Manning on Medical Records, Privacy & Confidentiality Legislation
Critcal Infrastructure Assurance Clearinghouse
Health Care Financing Administration (HCFA)
Health Insurance Portability and Accountability Act of 1996
Insurance Claims Privacy Protection Act, HR 1029
Joint Commission (on) Accreditation of Healthcare/Hospital Organizations (JCAHO)
National Committee on Vital and Health Statistics
New South Wales, Australia - Information Privacy: Code of Practice (December 1998)
New Zealand - Health Information Privacy Code (June 1994)
Office of Technology Assessment
Patient Health Records Privacy Act
Report to the U.S. Secretary of Health and Human Services
State Health Statutes
U.S. Health and Human Services Administrative Simplification
Research Institutions
George Mason University
Lawrence Berkley National Laboratory - William Johnston
Massachusetts Institute of Technology - Security Group
Massachusetts Institute of Technology - Ronald Rivest
Purdue University - Center for Education & Research in Info Assurance & Security (CERIAS)
Purdue University - Computer Operations Audit and Security Technology (COAST)
Purdue University - Gene Spaford
RSA Laboratories
Sandia Laboratories - Kevin McCurley (now at IBM Almaden Research Center)
Stanford Techology Law Review
National Academy of Sciences - Institute of Medicine
National Aeronautics and Space Administration (NASA) Ames Research Center
University of California, Berkeley - Internet Security, Applications, Authentication and Cryptography (ISAAC)
University of Texas, Houston Health Science Center
University of Virginia
Non-Profit Organizations
Better Business Bureau On-line
California Public Interest Research Group
Center for Democracy and Technology
Center for Democracy and Technology
Consumer Project on Technology
Electronic Frontier Foundation
Electronic Privacy Information Center
Electronic Privacy Information Center
- Public Attitudes
Forum on Privacy and Security in Healthcare
International Information Systems Security Certifications Consortium (ISC
2
)
Joint Healthcare Information Technology Alliance (JHITA)
Health Law Resource
Privacy Alliance
Privacy Rights Clearinghouse
Quality Measurement Advisory Services
SANS Institute
TRUSTe
Vermont's Health Information Network
Standards (Misc. then Organized By ISO Layer)
DynCorp Standards Committee Involvement
GTE's Involvement in President's Commission on Critical Infrastructure Protection
Agency for Health Care Policy and Research (AHCPR) - Health Informatics Standards Links
American Society for Testing and Materials (ASTM) E1869-97 Standard Guide
Army Technical Architecture (ATA) Information Security
Health Level Seven (HL7) Security Services Framework
Information Infrastructure Standards Panel (IISP)
INFOSEC Glossary
ISO/IEC JTC 1/SC 27 (Security Techniques Working Group)
Internet Engineering Task Force (IETF) Draft Security Standards
National Institute of Standards and Technology (NIST) - Public Key and Interface Links
Physical - Electronic Frequency Hopping, Direct Sequence Spreading, and Time Scrambling
Physical - TEMPEST Legality
Physical - TEMPEST Facilities
Data Link - Data Encryption Standard (DES)
Data Link - Data Encryption Standard (DES), Message Digest 5 (MD5), and WAN Encryption Protocol (WEP)
Data Link - Traffic Encryption (and Other) Keys
Network - Rotherwick's Firewall Resource
Transport - Encrypted Tunnels
Transport - Internet Security Association and Key Management Protocol (ISAKMP) with Oakley and Secure Key Exchange Mechanism (SKEME)
Transport - Virtual Private Networks (VPNs)
Session - Kerberos
Presentation - Abstract Syntax Notation One (ASN.1)
Presentation - Domain Name System Security (DNSSEC) Extensions
Presentation - Lightweight Directory Access Protocol (LDAP)
Presentation - Message Security Protocol (MSP)
Presentation - Public Key Cryptography Standards (PKCS)
Presentation - Public Key Infrastructure (PKIX) X.509
Presentation - Secure Electronic Transaction (SET)
Presentation - Secure Multi-purpose Internet Mail Extension (S/MIME), Privacy Enhanced Email (PEM), Pretty Good Privacy (PGP)
Presentation - X.400 Security
Application - Builder.Com
Application - CNET Virus Database
Application - Computer Incident Advisory Capability (CIAC) Virus Database
Application - Digital Signatures
Application - F-Secure (Data Fellows) Computer Virus Info Center
Application - HackerWacker
Application - Java Users Group's Security Page
Application - Java Security Frequently Asked Questions (FAQ)
Application - Portable Operating System for unIX (POSIX)
Application - Rotherwick's Firewall Resource
Application - Search Security Tech Target
Application - Secure HyperText Transfer Protocol (S-HTTP)
Application - Security Unit Virus Information Center (Incident Map)
Application - Stiller Research
Application - Viruses, Worms, and Trojan Horses
Systems & Products
Chief Information Officer - Solutions and Partners (CIO-SP)
Defense Switched Network (DSN)
Electronic Commerce with MasterCard, Mellon Bank, and U.S. Treasury
Government Emergency Telecommunications Service (GETS)
New York Stock Exchange (NYSE)
Tactical Personal Communications Services Subsystem (TacPCS)
Virtual Health Information Network (VHIN)
Baltimore Trusted Products
Baltimore Trusted World Partner
Cellular Digital Packet Data (CDPD)
Codex
Cylink
Hotspot Shield
eSecurityOnline Tools
eTrust
Site Patrol
Site Scan
Virtual Private Network (VPN) Advantage