When an information security event occurs, companies frequently use computer forensics to investigate what happened. It's also the key to confirming the presence of PII or PHI in the exposed data, and determining if - and who - to notify about the data breach. Bottom line: telling too many OR too few can drive costs up and confidence down.
Read this white paper to learn:
- The challenges that most often lead to over notification
- Three categories suggested for data 'triage,' and the experts to assign
- What the desired deliverable of successful PHI/PII analytics looks like