Readme updated
Browse files
README.md
CHANGED
|
@@ -86,7 +86,7 @@ jwtToken: Sensitive
|
|
| 86 |
color: Non-sensitive
|
| 87 |
```
|
| 88 |
|
| 89 |
-
In the healthcare industry, safeguarding sensitive patient data is of utmost importance, particularly when developing and maintaining software systems that involve database sharing. The Health Insurance Portability and Accountability Act (HIPAA) mandates strict regulations to ensure the privacy and security of Protected Health Information (PHI)
|
| 90 |
This research work proposes a novel approach that uses BERT based LLM for identifying sensitive database columns into the database schema in order to avoid PHI HIPAA violation.
|
| 91 |
|
| 92 |
|
|
|
|
| 86 |
color: Non-sensitive
|
| 87 |
```
|
| 88 |
|
| 89 |
+
In the healthcare industry, safeguarding sensitive patient data is of utmost importance, particularly when developing and maintaining software systems that involve database sharing. The Health Insurance Portability and Accountability Act (HIPAA) mandates strict regulations to ensure the privacy and security of Protected Health Information (PHI). Healthcare organizations must comply with these regulations to prevent unauthorized access, breaches, and potential legal consequences. However, ensuring HIPAA compliance becomes a complex challenge when databases are shared among multiple teams for debugging, development, and testing purposes.
|
| 90 |
This research work proposes a novel approach that uses BERT based LLM for identifying sensitive database columns into the database schema in order to avoid PHI HIPAA violation.
|
| 91 |
|
| 92 |
|