A new Dartmouth College study illustrates the risks involved in using peer-to-peer networks as well as the dangers of storing patient information in spreadsheets and documents outside of electronic health records.
In an interview, Daniel advises practices to "bake in" security technologies and practices from the start of an EHR implementation. He advises practices to ask records software companies tough questions about privacy and security issues, including:
A Congressman is citing the recent theft of an unencrypted laptop containing health information on 616 veterans as evidence that the Department of Veterans Affairs is not doing enough to protect information.
All healthcare organizations should create a detailed plan for meeting the requirements of the HITECH breach notification rule, says attorney Gerry Hinkley.
In an interview, Hinkley describes key steps hospitals, clinics and other should take, including:
Designating someone, such as the HIPAA privacy officer, to...
Healthcare organizations developing or updating information technology contingency plans for responding to emergencies, such as natural disasters, soon can take advantage of new guidance from the National Institute of Standards and Technology.
Although the list of major healthcare breaches reported to federal authorities so far does not yet include a large-scale hacking incident, organizations should nevertheless take preventive measures to avoid such attacks, a federal privacy expert says.
The best way to persuade physicians to take information security seriously is to explain the business risks involved, says Robert Tennant, senior policy analyst with the Medical Group Management Association, the trade group for physician group practice administrators.
The new federal HIPAA privacy and security rule compliance audits of healthcare organizations and their business associates likely will start later this year once a report on a model for the program is completed, a key federal privacy official says.
Social media "are a data security person's worst nightmare," says Sharon Finney, corporate data security officer at Adventist Health System. So Finney and her team spent more than six months crafting security policies for limited use of the new media.