Healthcare information and specifically Electronic Patient Healthcare (ePHI) has been in the news recently and featured as part of healthcare reform. The Health Information Technology for Economic and Clinical Health (HITECH) component of the American Reinvestment and Recovery Act (ARRA) of 2009 has not received as...
When private medical records are breached, healthcare service providers suffer damage to their brand, reputation, loss of trust from their patients, and severe financial repercussions. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) mandates that appropriate administrative, technical, and...
(Part three)
The most significant security provision of the HITECH Act is its explicit requirement for healthcare organizations to promptly notify individuals of data security breaches.
Two federal advisory committees will meet later in February to consider whether to recommend modifying two proposed electronic health record rules that affect healthcare information security.
When it comes to reporting data security breaches, healthcare organizations have the equivalent of a "get out of jail free" card, says consultant Tom Walsh.
(Part two of a four-part series)
The HITECH Act provides strong new incentives for healthcare organizations to create comprehensive data security plans and train their staffs on how to keep personal health information secure.
The Health Information Trust Alliance has enhanced its HITRUST Common Security Framework for protecting health information to reflect the impact of the HITECH Act.
Demand for qualified information security professionals is beginning to grow in healthcare.
The HITECH Act, which established tougher penalties and broader enforcement of enhanced versions of the HIPAA privacy and security rules, is proving to be a powerful catalyst for ramping up information security. Plus, as...
Every IT vulnerability survey of the past 10 years has had the same item at the top of the list: internal personnel our so-called trusted workers. Billions of dollars, countless vulnerability assessments, thousands of innovative security solutions later, and we still haven't moved the trusted worker off the top of the...
A well-known healthcare information security expert who's advising federal regulators on policy issues offers advice to organizations preparing to comply with the data breach notification requirements of the HITECH Act.
In an interview, Dixie Baker of SAIC advises hospitals and others to:
Study how the HITECH...
The Obama Administration on Feb. 1 released a summary of its fiscal 2011 budget proposal that includes a 28% increase in funding for a unit that plays a major role in ensuring the privacy and security of health information.
Completing security risk assessments for a long list of applications and providing information security training to its entire staff are two of the top priorities for 2010 at Johns Hopkins Medicine, one of the nation's largest academic medical centers.
In an interview, Stephanie Reel, vice president for information...
Whether a hospital has a chief information security officer is dependent, in large part, on the size of the facility.
For example, while many academic medical centers have a CISO and a team of security experts, many community hospitals, faced with budget constraints, do not. Instead, the CIO and members of his...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.