Talk:Medical data breach
This article is rated C-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Need inclusion criteria for list of breaches
[edit]At the time of this comment, the US HHS Breach portal lists 1,585 breaches affecting 500 or more individuals. Obviously, the list of breaches in this article shouldn't contain every reported breach in every country that requires such reporting. It would be wise to establish inclusion criteria before the list gets unwieldy. I suggest including events based on the number of individuals impacted as a percentage of national population. Here's how three different break points would limit inclusion for U.S. breach events (based on population from the 2010 Census and breach data from the link above):
% Population Impacted |
Individuals Impacted |
Events Included |
---|---|---|
≥ 10% | ≥ 30,934,969 | 1 |
≥ 2% | ≥ 6,186,994 | 3 |
≥ 1% | ≥ 3,093,497 | 8 |
—Shelley V. Adams ‹blame
credit› 18:16, 17 June 2016 (UTC)
Wiki Education assignment: DATS 6450 - Ethics for Data Science
[edit]This article was the subject of a Wiki Education Foundation-supported course assignment, between 12 January 2022 and 26 April 2022. Further details are available on the course page. Student editor(s): Wanting14 (article contribs).
- C-Class medicine articles
- Low-importance medicine articles
- C-Class society and medicine articles
- High-importance society and medicine articles
- Society and medicine task force articles
- All WikiProject Medicine pages
- C-Class Finance & Investment articles
- Low-importance Finance & Investment articles
- WikiProject Finance & Investment articles
- C-Class Internet articles
- Low-importance Internet articles
- WikiProject Internet articles
- C-Class Computer Security articles
- Low-importance Computer Security articles
- C-Class Computer Security articles of Low-importance
- C-Class Computing articles
- Low-importance Computing articles
- All Computing articles
- All Computer Security articles