A federal advisory committee has recommended keeping the information privacy and security requirements untouched in pending criteria for demonstrating meaningful use of electronic health records to receive Medicare and Medicaid incentive payments.
Khalid Kark, vice president at Forrester Research, recently wrote an in-depth report on healthcare information security in which he described five key principles.
In an interview, Kark discusses each principle, including:
Take a risk-based approach and look beyond regulatory compliance, focusing instead on...
Should software developers be held liable for their programming errors? A consortium of international cybersecurity experts says yes - and will present its plan for such a program on Tuesday. But at least one dissenting voice calls the effort "counterproductive and silly."
Let's give BlueCross and BlueShield of Tennessee some credit for acknowledging that it has spent more than $7 million so far dealing with the aftermath of the theft of 57 unencrypted hard drives from a call center.
That breathtaking sum makes it crystal clear that potential data breaches have huge business...
Faced with the threat of much stiffer penalties for data security violations and ramped-up enforcement at the federal and state levels, many hospitals are just starting to pay serious attention to security, contends security consultant Kate Borten. But they must go far beyond investing in new technologies to develop...
More than $750 million worth of federal grants will fund state health information exchanges as well as new regional extension centers offering healthcare IT training, according to the U.S. Department of Health and Human Services.
To make sure their information technology strategies adequately address the needs of physicians, many hospitals have designated a doctor to serve as chief medical informatics officer. These physicians are working closely with CIOs, CSOs and others to help select and implement I.T., including technologies to keep...
The rules of job seeking are in constant flux - particularly in information security, where job demands and requirements are ever-evolving.
Where does that leave a job seeker looking to stand out from the crowd?
The following are strategies offered by information security hiring managers:
With House passage of the Cybersecurity Enhancement Act, add one more piece of infosec legislation for the Senate to consider. Still, there's no guarantee that bill or any major IT security measure will be signed into law in 2010.