A federal advisory panel has endorsed the basic elements of what should be included in a new rule spelling out how to govern organizations using national standards for health information exchange.
Dixie Baker, a well-known healthcare information security expert who's advising federal regulators on policy issues, offers her predictions for the top trends for 2011.
Hemu Nigam says WikiLeaks founder Julian Assange has become akin to a "cyber messiah" And Assange's followers have proven: "If you turn your back on our messiah, we are going to take you down."
Cybersecurity reform was part of a defense bill that included a provision to repeal a law that bar gays from serving openly in the military. Supporters couldn't muster the support to bring a Senate vote on the bill.
The Office of the National Coordinator for Health Information Technology will host webcasts Dec. 14 and 15 on its efforts to implement the HITECH Act, including its privacy provisions.
"Companies are increasingly looking for individuals who have a business mindset and can make the connections among security, IT risk and business," says John Reed, executive director of Robert Half Technology.
A presidential advisory council is calling for the development and widespread adoption of a "universal exchange language" to ease the transfer of health information while maintaining privacy.
The plan calls on Federal CIO Vivek Kundra to publish within the next six months a strategy to accelerate the safe and secure adoption of cloud computing across the government.
"With the right people, process and technology, you could be able to put a system together that would greatly reduce the impact these types of attacks have," says cybersecurity expert Eric Cole, a SANS Institute faculty fellow.
Seven pilot projects are beginning tests of The Direct Project, which enables simple, secure exchanges of information between two healthcare organizations.
The House has joined the Senate in approving legislation that would exempt certain businesses, including physician practices and apparently many hospitals, from the Identity Theft Red Flags Rule.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.