Advice from the report, Bring Your Own Device: A Tool Toolkit to Support Federal Agencies Implementing BYOD Programs, is applicable to all types of public and private organizations.
The Department of Veterans Affairs will soon solicit bids for a mobile device management system. Get the latest update on how the VA's plan to roll out more than 100,000 devices is evolving.
The two final rules for Stage 2 of the HITECH Act electronic health record incentive program don't include firm data encryption mandates. But they come very close, indeed. And that's an important step forward.
The Office of the National Coordinator for Health IT is studying use of mobile devices in small healthcare environments. The goal: new mobile security guidance that will be released in 2013.
Will President Obama go around Congress to advance his cybersecurity agenda by issuing an executive order? Cybersecurity Act co-sponsor Sen. Jay Rockefeller encourages the president to do just that.
Cloud computing and mobile technologies add new complexities to how we approach identity and access management. RSA CTO Sam Curry offers advice on overcoming the challenges.
A new House bill that would let VA doctors treat veterans across state lines via telemedicine opens up questions about how state privacy laws might apply to physicians in the event of a breach.
The Department of Veterans Affairs' effort to expand the use of mobile devices has stalled, and it's re-examining the eventual role of personally owned devices. Learn about the latest developments.
John Halamka, M.D., CIO at Beth Israel Deaconess Medical Center in Boston, describes an 18-month privacy and security compliance effort that includes a focus on mobile device security.
Her first nine months on the job included a data breach and a CEO shakeup. Hear how Symantec CISO Patricia Titus has adapted to business change and re-focused the company's security team.
Security personnel should be required to prove not only that they know how to do things right, but also that they know how to do the right thing. They must demonstrate commitment to ethical behavior.
Intuit and GE veteran Steve Bennett, chairman of the IT security software provider, replaces Enrique Salem, the longtime Symantec executive who had served as the company chief executive officer since April 2009.
Following the recent theft of a physician's unencrypted personal laptop, Beth Israel Deaconess Medical Center is stepping up efforts to make sure that its encryption mandate is actually followed.
A new application for Apple mobile devices is designed to help healthcare organizations assess whether an incident is a breach that must be reported to federal authorities. Find out how it works.
Medical identification theft is on the rise. Will healthcare reform, as recently affirmed by the Supreme Court, help reverse that trend? Here's why it's difficult to predict the impact of reform.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.