"We find it hard to believe that there are any reasons or basis to oppose this legislation," presidential counterterrorism adviser John Brennan says of the Cybersecurity Act of 2012. "I'm just very puzzled as to why individuals would oppose this."
The Office of Management and Budget is now reviewing both rules for Stage 2 of the HITECH Act electronic health record incentive program - the final step before publication.
Maine's health information exchange uses a centralized data architecture that offers security advantages over other models, contends Devore Culver, CEO.
"To say I'm disappointed is a tremendous understatement," says Senate Majority Leader Harry Reid. "I thought we'd all put national security above partisan politics."
Microsoft says its next version of the Internet Explorer web browser will feature "do not track" as a default user setting. What are the online privacy implications? Trevor Hughes of the IAPP weighs in.
Amidst the hepatitis C outbreak at Exeter Hospital in New Hampshire, we need to ask: How could this happen? How could a medical technician even be hired after being fired at least twice by other hospitals?
Boards of directors continue to overlook IT risk management, security and privacy as a top agenda item, says Jody Westby of Carnegie Melon CyLab. Where are the organizational gaps that need to be filled?
As more consumers take advantage of mobile devices for telemedicine, they need to be educated on steps to take to help ensure that their medical information remains secure, says telehealth expert Chuck Parker.
After a breach, some organizations meet the minimum requirements for notification and then hope for the best. The Utah Department of Health is taking a very different approach that's worthy of imitation.
Global Payments Inc. says its data breach investigation is complete, and so far the incident has cost the company $84.4 million. What's next for the payments processor as it recovers from this breach?
Whether intentional or not, software features have the potential to leak sensitive information, corrupt data or reduce system availability. The National Institute of Standards and Technology's latest guidance aims to help organizations minimize vulnerabilities.
In the latest update, much was left unsaid about the Global Payments data breach. And if I were a Global customer or card-issuing entity, I'd have some serious follow-up questions.
The Privacy and Security Tiger Team is hammering out recommendations for how best to authenticate the identities of physicians and other individuals who electronically exchange health information. Find out what's under consideration.
President Obama endorses the Cybersecurity Act of 2012 despite the removal of provisions from an earlier version of the bill that would have given the federal government authority to regulate the mostly privately owned critical national IT infrastructure.
The Health Information Trust Alliance has unveiled a Cyber Threat Analysis Service, offering updates on the latest healthcare security threats and a variety of research reports.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.