The fate of pending regulations, an upcoming HIPAA Security Rule compliance toolkit and a crackdown on records snoops were among the most popular news items on HealthcareInfoSecurity in May.
Many have been asking lately if the Department of Health and Human Services' Office for Civil Rights has been effective in carrying out its HIPAA enforcement role. The question is a fair one.
Best practices for protecting medical devices are sorely lacking. That's why it's excellent news that a new consortium is attempting to devise some best practices for keeping medical devices secure.
One of the unexpected impacts of the global economic crisis is that many organizations have lost their business resiliency, says Lyndon Bird, director of The Business Continuity Institute, headquartered in the U.K.
A key factor in ensuring that information technology is available in the wake of a disaster is cross-training IT staff to handle multiple roles, says Terrell Herzig, information security officer at UAB Medicine.
Widely publicized reports aren't giving the full picture of an (ISC)2 survey that projects the doubling of the federal government IT security workforce by 2015.
Personalized medicine research, which relies on genetic information paired with electronic health records, could pave the way for many treatment breakthroughs. But because of the sensitive nature of the information involved, pioneers in this field must take extra privacy and security precautions.
One of the most significant conferences of the year devoted to healthcare information security issues will be held next week in Washington, and we'll be providing full coverage.
In his first three weeks on the job, Farzad Mostashari, M.D., national coordinator for health information technology, made good on his pledge to improve communication in his office.
The U.S. Supreme Court heard arguments Tuesday in a healthcare privacy case dealing with the power of states to bar data mining companies from selling information about doctors' prescription-writing habits to drug companies.
North American Clearinghouse Association, not the government, led the effort to move Food Stamps to e-payments. That's what the government wants to do with the National Strategy for Trusted Identities in Cyberspace initiative, the fed's NSTIC point man says.
About the same percentage of respondents cite China as a major source of concern for cyberattack as they did a year ago, a McAfee study reveals. What changed? Concern about the U.S. has declined, says study author Stewart Baker.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.