The Medical Group Management Association and the American Medical Association offer very different assessments of the proposed security provisions in the "meaningful use" rule for the federal electronic health record incentive program.
Building public trust, as called for under a draft of a federal "Health IT Strategic Framework," will require educating healthcare organizations on security compliance as well as tough enforcement of federal regulations, experts say.
The first draft of the framework correctly points out that public trust is vital...
UAB Health System in Birmingham, Ala., is tackling a long list of risk management projects, including updating intrusion detection and prevention systems.
In an interview, Terrell Herzig, HIPAA security officer, outlines priority projects and key lessons learned, including:
Expanding the use of...
Michael Frederick, chief information security officer at Baylor Healthcare System in Dallas, is using the HITRUST Common Security Framework to help ease the task of complying with multiple regulations.
Hospitals preparing for a potential government audit of their HIPAA security rule compliance should "build a continual state of readiness," says David Wiseman, information security manager at Saint Luke's Health System, Kansas City, Mo.
Chief information security officers need to be able to translate technical projects into clear business terms, says Todd Fitzgerald, co-author of the book, "CISO Leadership Skills: Essential Principles for Success."
In an interview, Fitzgerald:
Describes the managerial skills that CISOs need;
Outlines how to...
The federal government's new list of major healthcare breaches is far too difficult to find. While the U.S. Department of Health and Human Services is living up to the letter of the law in posting the list deep within its Office for Civil Rights' Web site, it's sure making it difficult to reach the list.
The Office of the National Coordinator for Health Information Technology has posted a preliminary draft of its "Health IT Strategic Framework" that spells out, among other things, its proposed federal privacy and security strategies.