As social media continues to evolve and new threats continue to emerge, organizations must constantly re-evaluate their policies and conduct risk assessments, says Andrew Kennedy, who heads up social media policy for BITS.
When it comes to banning the use of social media in the workplace, Jenny Corotis Barnes, assistant general counsel at Ohio State University Medical Center, has a strong opinion: Forget about it.
"Veterans should have consistent and convenient access to reliable VA information real time using social media, whether on a smartphone or a computer," Secretary of Veterans Affairs Eric Shinseki says.
A hospital CIO calls for studies of how best to match patients to their records, citing the issue as critical to the success of health information exchanges.
Do patients really want to know the identity of every doctor, nurse, technician, intern, specialist, admin and consulting physician who ever viewed their records?
A consumer advocacy group is calling attention to a little-known fact about seven federal breach notification bills pending in Congress: They would leave certain healthcare information unprotected.
When economists dissected July's 0.1 point drop in overall unemployment, to 9.1 percent, they attributed the decline mostly to fewer people seeking work. But that's not the case for IT security professionals. There are few discouraged workers in the information technology occupation categories these days.
In social media policies, organizations are putting too much emphasis on what not to do, as opposed to how to navigate the space effectively, says social media expert Sherrie Madia.
Associations representing clinic administrators, healthcare CIOs and health information managers are asking federal regulators to go back to the drawing board on the access report provision of a proposed Accounting of Disclosures rule.
"The action and manifestation of risk is not necessarily evident to today's users in the way it was in the past, and that creates a big inherent challenge for a CISO," says Malcolm Harkins, CISO at Intel Corp.
You know your organization's social media policy is a good one when it starts sounding less like a checklist and more like common sense, says Sherrie Madia, social media expert and author.
Social media, mobility and cloud computing are new areas of risk for organizations, and risk managers need to go back to the fundamentals of understanding the information they are protecting, says Robert Stroud, ISACA's international vice president.
We all know the cost of regulatory compliance - how expensive it can be to meet the standards of HIPAA, HITECH and other industry guidelines. But two organizations this week learned hard lessons about the cost of non-compliance.
Emerging technology is often touted for enhancing security. But if not properly deployed and integrated, these technologies can hinder rather than improve security.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.