A California hospital is notifying more than 514,000 patients of a breach of a limited amount of personal information stemming from the theft of an unencrypted computer.
When it comes to privacy and security issues, a draft of a Federal Health IT Strategic Plan for 2011-2015 lacks vision and details, some observers say.
An Illinois childcare agency has articulated a revised security policy, including the use of encryption, in announcing a breach involving the apparent theft of three back-up unencrypted portable hard drives.
As healthcare organizations digitize more patient information, they need to take five essential risk management steps to ensure that the data is secure and privacy is protected, says Raj Caudhary, a principal at the consulting firm Crowe Horwath.
A draft of a Federal Health IT Strategic Plan provides a roadmap that the next national coordinator for health IT may use in spearheading many efforts, including protecting the privacy of healthcare information.
There are some encouraging signs that stage two criteria for the HITECH Act's electronic health record incentive program will include substantial privacy and security requirements.
The Privacy and Security Tiger Team is scrambling to finish its recommendations for stage two requirements for the HITECH Act's electronic health record incentive program.
The federal list of major health information breaches that have occurred since September 2009 included 249 incidents affecting nearly 8.3 million individuals as of Tuesday. But the total affected could surpass 10 million once details about the recent Health Net breach are added.
A roundup of this week's top news: Hackers target RSA's SecurID products. Also, Japan's nuclear crisis: What do you need to know? Plus: New Health Net breach may be biggest ever.
A second California state agency has launched an investigation into insurer Health Net's recent information breach incident that may have affected 1.9 million individuals nationwide.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.