Developing a bring-your-own-device
policy that's well-integrated with an organization's overall information security strategy requires a multi-disciplinary, collaborative approach, says attorney Stephen Wu.
Comments are being accepted through Jan. 14, 2013, on potential privacy and security requirements to be included in the meaningful use rule for Stage 3 of the HITECH Act's electronic health record incentive program.
Prompted by the WikiLeaks breach, President Obama has issued a memorandum directing federal agencies to implement minimum standards to protect vast amounts of classified data on government computers, networks and systems from insiders.
The Centers for Medicare and Medicaid Services needs to better integrate its anti-fraud system with its claims payment system to stop fake Medicare bills from being paid, according to a new GAO report. What else does GAO recommend?
Rules for Stage 3 of the HITECH Act electronic health record incentive program are in the works. Find out how to provide feedback on the proposed privacy and security provisions, including authentication requirements.