BlueCross BlueShield of Tennessee has agreed to pay a $1.5 million settlement and carry out a corrective action plan in the wake of a 2009 breach that affected more than 1 million individuals.
Organizations are urged to adopt six principles to avoid the perils of transferring IT decision making away from technology specialists to business unit leaders.
Federal officials have released a final rule setting guidelines, including privacy and security provisions, for state insurance exchanges, called for under healthcare reform, which must begin operating by 2014.
One important way to prepare for Stage 2 of the HITECH Act electronic health record incentive program is to take steps toward eliminating storage of patient records on mobile devices, says privacy expert Deborah Gascard Wolf.
Apple's introduction of its third iteration of the iPad e-tablet, coupled with the growing popularity of cloud computing, could lead to new methods of enterprise computing and IT security, Delaware Chief Security Officer Elayne Starkey says.
Jet Propulsion Laboratory IT Chief Technology Officer Tom Soderstrom is showing that a deliberate, methodical approach can lead to effective and secure cloud computing.
White House Cybersecurity Coordinator Howard Schmidt, in an exclusive interview, expresses optimism that Congress could enact significant cybersecurity legislation this year even if President Obama doesn't get all that he wants in an IT security bill.
A network of cancer hospitals that has relied heavily on laptop computers for clinicians accessing electronic health records is phasing in iPads and iPhones. Learn what steps it's taking to mitigate the security risks involved.
Federal regulators will host a "national provider call" on Monday, March 12, to provide an overview of the proposed Stage 2 "meaningful use" rule for the HITECH Act electronic health record incentive program.
Though Todd Park's primary focus is to identify ways to exploit IT to make the government run more efficiently, he'll collaborate with others to make sure technology the government employs is secure.
Apple's release of the new iPad will affect business. How should organizations incorporate new mobile concerns into their BYOD policies? Joe Rogalski of New York's First Niagara Bank weighs in.
An Oregon nursing assistant spent eight days in jail for invasion of personal privacy on Facebook. The case provides an eye-opening lesson about the consequences of misusing social media.
WLANs often have weaker configurations and authentication processes that make them vulnerable for attackers to penetrate and gain access to sensitive information. New guidance from NIST is aimed at helping organizations meet security challenges.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.