Some call it HIPAA on Steroids. Others simply call it HIPAA II. Technically, it's the Health Information Technology for Economic and Clinical Health Act. But however you label it, the HITECH Act spells out tougher data security requirements for all health care organizations as well as their business associates.
For physician group practices, responding to requests from patients, lawyers, insurers and others for copies of patients' medical records is a time-consuming, labor-intensive headache. But one New York practice has found that secure e-mail is a cure for that pain, as well as a remedy for other communication maladies.
The HITECH Act should be a wake-up call to physician group practices of all sizes regarding the need to take data security seriously, a consultant who advises practices stresses. And that means following the right procedures as well as using the right technologies, says Rosemarie Nelson, principal at MGMA Consulting...
The single most important step hospitals should take to comply with the HITECH Act is to retrain all employees, physicians and even volunteers on how to maintain the privacy and security of personal health information. That's the advice of Dan Rode, a regulatory expert at the American Health Information Management...
One goal of Duke University's new health informatics program, which launches this fall, is to build awareness of information security and privacy issues among future IT leaders. That's the word from W. Ed Hammond, Ph.D., director of the new Duke Center for Health Informatics.
The spotlight is intensifying on the need to use the latest technologies to ensure the privacy and security of healthcare information, especially electronic health records.
That's largely because the HITECH Act set tougher penalties for violations of the HIPAA security and privacy rules and ramped up enforcement.
It's hard to place a value on an intrusion detection system until you see the system in action. CIO Charles Christian at Good Samaritan Hospital in Vincennes, Ind., recently discovered just how worthwhile his intrusion detection investment really is.
Increasingly, digital forensics is an important element of an information security program for organizations of all types and sizes.
But where can security leaders find qualified forensics professionals? How can these professionals obtain the skills and expertise they need to be successful?
Rob Lee of Mandiant...
Provisions of the bill would help develop a skilled government infosec workforce, prioritize federal cybersecurity R&D, improve the transfer of cybersecurity technologies to business and promote cybersecurity education and awareness.