A review of this week's top news items, including:
Breach Alert: Copiers Are a Risk
HITECH Act Compliance for Business Associates
Privacy Concerns a Roadblock to PHRs
After listening to this overview, be sure to check out all of the week's news and views at HealthcareInfoSecurity.com
When will federal regulators draft long-awaited privacy and security rules for personal health records? So far, officials at the Department of Health and Human Services are being tight-lipped on the subject. Asked about the status of the rules, which, under the HITECH Act, were due in February, an HHS spokesman would...
A Boston physician had his unencrypted laptop stolen while he was visiting South Korea for a lecture. But the computer contained a tracking device that later was used to disable the hard drive, rendering information permanently unreadable.
As more healthcare organizations ramp up their use of electronic health records, some are concluding that using biometric technology to verify patients' identities can help improve patient safety and prevent identity theft.
Why would a clinic serving uninsured and Medicaid patients in New York City invest in futuristic iris scanners? Because the technology helps the clinic avoid calling up the wrong patient record because of mistaken identity and also serves as a useful fraud prevention tool.
Just when you think you've heard about all the potential ways healthcare information can be breached comes word of an insurance company that forgot to empty a filing cabinet it donated along with other surplus office furniture.
Healthcare organizations must revamp their business associate contracts to help ensure compliance with the HITECH Act's breach notification rule, says security expert Tom Walsh.
In an interview, Walsh points out that under the rule, business associates, such as banks, billing firms and software companies, that have...
For personal health records advocates, pending PHR privacy and security rules can't come fast enough. A new consumer survey found that "worry about the privacy of my information," was the biggest barrier to PHR use.
Interview with Robert Richardson, Director of CSI
How vulnerable are organizations to cyber attack? It depends on your definition of "vulnerable," says Robert Richardson, Director of the Computer Security Institute (CSI). "There's vulnerable," he says, "and then there's likely to be attacked."
In an interview...