Some organizations may need to reconsider how they assess whether incidents are reportable breaches under the HIPAA Omnibus Rule, explains privacy expert Kate Borten.
Under the HIPAA Omnibus Rule, the process of obtaining patients' permission for use of their information in medical research projects has been updated, explains privacy attorney Adam Greene.
What are the top three cybersecurity game changers, and what negative impact can they have on organizations if security leaders do not manage them properly? Rolf von Roessing of ISACA shares insight.
Getting critical infrastructure operators involved is the biggest challenge the federal government faces in creating a cybersecurity framework, says NIST's Adam Sedgewick, who leads efforts to create the framework ordered by President Obama.
A new report shows that large data breaches in all sectors last year in California mirror a problem that keeps happening at lots of healthcare entities across the country. Find out what that problem is.
To prepare for HIPAA compliance audits once they resume, healthcare organizations need to conduct a thorough risk assessment, says Verne Rinker of the HHS Office for Civil Rights.
Data from social media sites like Facebook, along with mobile device texts, will be analyzed by researchers in the aim of preventing suicide among U.S. Veterans. But how will privacy be protected?
Aimed to be voluntarily adopted by the nation's critical infrastructure operators, the cybersecurity framework will revolve around a core structure that includes five major cybersecurity functions: Know, Prevent, Detect, Respond and Recover.
What's it take to track down and modify hundreds of business associate contracts to ensure HIPAA Omnibus compliance? Shallie Bryant of CaroMont Health shares insight and tips from her experience.
Intermountain Healthcare and Deloitte Consulting have teamed up to offer a new platform for healthcare data analysis. But how are they also still ensuring they protect patient privacy?
Partners HealthCare is integrating patients' remote monitoring data from medical devices into their electronic health records. But what are the essential security steps for this project?
Significant security flaws involving access, configuration-management and continuous-monitoring controls have been identified in a new Inspector General audit of Veterans Affairs' IT systems.
More than one-quarter of the U.S. Senate is asking the national intelligence director to reveal more information to the public regarding the government's programs to collect massive amounts of data on communications of ordinary Americans.
Reports continue to show that an overwhelming percentage of applications have serious vulnerabilities. The important takeaway here is that application security has not improved in the last 10 years.
A side benefit of consolidating the military's 15,000 networks is the need for fewer systems administrators. Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, says that should help diminish the insider threat.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.