Healthcare organizations need to more closely monitor how their business associates protect the security of patient information and step up risk assessments as they prepare to comply with looming HIPAA modifications, says attorney Lisa Sotto.
Several legal experts say new federal guidance fleshes out details about how healthcare organizations should de-identify patient data aggregated for research. But one privacy advocate says the guidance is inadequate.
"Accessing medical records [should be] as easy as accessing banking records today," says Farzad Mostashari, M.D., national coordinator for health IT, addressing a hearing on patient ID authentication.
A new report says the Department of Health and Human Services must improve oversight of the HITECH Act's EHR incentive program, so that providers show better proof of compliance, including risk assessments.
The HHS Office for Civil Rights has released long-overdue guidance on how to de-identify patient data for use in research in accordance with the HIPAA Privacy Rule. Find out what's in the guidance.
Comments are being accepted through Jan. 14, 2013, on potential privacy and security requirements to be included in the meaningful use rule for Stage 3 of the HITECH Act's electronic health record incentive program.
A long-delayed omnibus package of regulations, including modifications to the HIPAA privacy and security rules, remains tied up in government limbo. When might the new rules be released?
Rules for Stage 3 of the HITECH Act electronic health record incentive program are in the works. Find out how to provide feedback on the proposed privacy and security provisions, including authentication requirements.
Farzad Mostashari, who heads the Office of the National Coordinator for Health IT, told a House panel that the HITECH incentive program is on track to achieve its goals of widespread adoption of EHRs and secure data interchange.
Despite numerous data breaches, as well as financial incentives and penalties, many healthcare organizations aren't taking risk assessment requirements seriously. Experts offer insights on best practices.
It's difficult to know where sensitive patient information may be lurking in user files. But some healthcare organizations are finding ways to detect where the information resides so they can protect it. Find out how.
"We will bring in best practices for HIPAA and technology best practices in terms of encryption in how we handle data and share it with stakeholders," says Curt Kwak CIO of Wash. State Health Benefit Exchange.
Human genome sequencing can support groundbreaking research leading to improved treatments. But before genetic testing can become common, privacy issues need to be tackled, says Lisa M. Lee, who heads a presidential advisory panel.
How can hospitals and physicians prepare to comply with the HITECH Act electronic health record incentive program's Stage 2 privacy and security requirements? Federal privacy officer Joy Pritts provides insights.
The HHS Office of Inspector General plans to scrutinize whether any HITECH Act electronic health record incentive payments have been inappropriately issued and review HIPAA compliance enforcement efforts.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.