New York-Presbyterian Hospital/Columbia University Medical Center says a security breach may have exposed information on 6,800 patients on the Internet in July.
A privacy and security "tiger team" will continue to meet this fall to draft recommendations on a number of issues related to the exchange of patient records.
Kevin Johnson, SANS instructor and security expert, on what you need to know about Stuxnet, Twitter worms and other new threats to organizations and privacy.
The Markle Foundation's "blue button" concept for enabling patients to download their records from a secure website is suitable for a wide variety of healthcare organizations, says Josh Lemieux, the foundation's director of personal health technology.
Detailed patient consent recommendations that a privacy and security "tiger team" recently completed are just a starting point toward giving patients far more control over their healthcare information, the co-chair of the team acknowledges.
Of the 28 incidents added to the official federal tally of major healthcare information breaches in the past month, two-thirds involved the theft or loss of unencrypted computer devices.
The United States should look to the European Union for examples of how to successfully protect the privacy of patient information, the co-author of a new report on electronic health records says.
Organizations today approach social media one of three ways: They embrace it, ignore it or are immobilized by it. The key to success is to manage the transition.
Defense contractors need hands-on candidates who can understand the technical and business issues within the government. Problem is: The demand for these candidates is clearly ahead of the current supply.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.