To prepare for HIPAA compliance audits once they resume, healthcare organizations need to conduct a thorough risk assessment, says Verne Rinker of the HHS Office for Civil Rights.
Data from social media sites like Facebook, along with mobile device texts, will be analyzed by researchers in the aim of preventing suicide among U.S. Veterans. But how will privacy be protected?
The best argument for enactment of a federal data breach protection law to replace 46 state statutes is that physical location is not relevant in a society that relies on mobile technologies, says public policy advocate David Valdez.
Aimed to be voluntarily adopted by the nation's critical infrastructure operators, the cybersecurity framework will revolve around a core structure that includes five major cybersecurity functions: Know, Prevent, Detect, Respond and Recover.
What's it take to track down and modify hundreds of business associate contracts to ensure HIPAA Omnibus compliance? Shallie Bryant of CaroMont Health shares insight and tips from her experience.
Intermountain Healthcare and Deloitte Consulting have teamed up to offer a new platform for healthcare data analysis. But how are they also still ensuring they protect patient privacy?
Partners HealthCare is integrating patients' remote monitoring data from medical devices into their electronic health records. But what are the essential security steps for this project?
Significant security flaws involving access, configuration-management and continuous-monitoring controls have been identified in a new Inspector General audit of Veterans Affairs' IT systems.
More than one-quarter of the U.S. Senate is asking the national intelligence director to reveal more information to the public regarding the government's programs to collect massive amounts of data on communications of ordinary Americans.
Reports continue to show that an overwhelming percentage of applications have serious vulnerabilities. The important takeaway here is that application security has not improved in the last 10 years.
A side benefit of consolidating the military's 15,000 networks is the need for fewer systems administrators. Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, says that should help diminish the insider threat.
Americans are not overly concerned about their own cybersecurity - according to Unisys' latest security index - yet CISOs cannot become overly complacent, says the company's Steve Vinsik.
In complying with the HIPAA Omnibus Rule, covered entities need to demand that their business associates are protecting patient information stored on mobile devices, says consultant Bill Miaoulis.
Whether or not Congress enacts cyberthreat intelligence sharing legislation, the IT security community is moving forward with its own information sharing initiatives, MS-ISAC Chairman William Pelgrin says.
As a result of the HIPAA Omnibus Rule, business associates need to develop a HIPAA-compliant culture, says healthcare privacy attorney Gerry Hinkley, who explains the essential steps involved.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.