(Part one of a four-part series)
For years, healthcare organizations have faced federal requirements to comply with HIPAA privacy and security rules. But those rules had no teeth because they were rarely enforced.
Last year's passage of the HITECH Act toughened the rules, mandated ramped-up enforcement and...
Patients have a right to know when their information was disclosed or breached. And so does the Department of Health and Human Services (HHS), and in some extreme cases, your local news media - largely because of the HITECH Act.
One of the nation's best-known healthcare data security experts who's advising federal regulators on policy issues offers advice to organizations preparing to comply with the data breach notification requirements of the HITECH Act.
In an interview, Dixie Baker of SAIC advises hospitals and others to:
Study how...
Faced with the threat of much stiffer penalties for data security violations and ramped-up enforcement at the federal and state levels, many hospitals are just starting to pay serious attention to security, contends consultant Kate Borten. But they must go far beyond investing in new technologies to develop...
Hospitals and other healthcare organizations need to identify data security breaches "in a much more systematic way" to help ensure the privacy of personal information. That's the advice of Lisa Gallagher, senior director for privacy and security at the Healthcare Information and Management Systems...
The single most important step hospitals should take to comply with the HITECH Act is to retrain all employees, physicians and even volunteers on how to maintain the privacy and security of personal health information. That's the advice of Dan Rode, a regulatory expert at the American Health Information Management...
To make sure their information technology strategies adequately address the needs of physicians, many hospitals have designated a doctor to serve as chief medical informatics officer. These physicians are working closely with CIOs, CSOs and others to help select and implement I.T., including technologies to keep...
Visa has announced new global best practices for data field encryption, also known as end-to-end encryption - a much-discussed solution in the wake of the Heartland Payment Systems breach.
Critics of the Heartland Payment Systems data breach have called out for tougher encryption standards for financial institutions and their third-party service providers. Applications for encryption are all around us from encrypting email traffic to board communications, remote access and mobile & Internet banking....
Data security breaches add millions of dollars to bottom line expenses, but there is also the immeasurable cost of security breaches on your brand that affect future revenue and growth. Virtually every financial institution today exchanges large amounts of information both inside and outside the organization....
Forensics has become a hot topic for a variety of internal factors, including the importance of the Internet to everyday business and, with it, the rise of electronic fraud.
Externally, financial institutions especially feel regulatory heat in the form of FFIEC GLBA Notification Rule, SEC/NASD Rule 3010 and even he...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.