Healthcare organizations need to improve the methods they use to objectively assess the severity of a security incident and whether it should be reported, says David Parks, a privacy officer and attorney.
When it comes to managing relationships with business associates to help with HITECH Act compliance, healthcare organizations could learn some lessons from the banking industry.
Kevin Johnson, SANS instructor and security expert, on what you need to know about Stuxnet, Twitter worms and other new threats to organizations and privacy.
Organizations today approach social media one of three ways: They embrace it, ignore it or are immobilized by it. The key to success is to manage the transition.
The United States should look to the European Union for examples of how to successfully protect the privacy of patient information, the co-author of a new report on electronic health records says.
For most organizations, the biggest barrier to cloud computing is fear - "Will my data be secure?" It's time to tackle that fear head-on, says Jeff Reich, director of the Institute of Cybersecurity at the University of Texas, San Antonio.
Pairing a single sign-on system with authentication technologies enables hospitals to provide easier access to electronic health records while ensuring only appropriate clinicians view patient information, the IT director of a rural Iowa hospital says.
Small, rural hospitals that lack the resources to conduct a thorough risk assessment should seek out grants to fund hiring outside experts to complete the task, one hospital CEO advises.
This week's top news and views: Dispute Arises Over Breach Notification; Legal Issues in Cloud Computing; Clarity Needed in Breach Notification Rule. And don't miss our audio week-in-review podcast by Howard Anderson, managing editor.
Organizations considering using the cloud computing model should carefully consider a long list of legal issues before taking the plunge, an attorney advises.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.