The best way to persuade physicians to take information security seriously is to explain the business risks involved, says Robert Tennant, senior policy analyst with the Medical Group Management Association, the trade group for physician group practice administrators.
The New Mexico Human Services Department is notifying about 9,600 Medicaid enrollees about a breach stemming from the theft of car with an unencrypted laptop in its trunk.
In discussing Colorado's foray into cloud computing, Colorado Chief Information Security Officer Seth Kulakow discusses the demands the cloud presents governments and offers advice for IT security professionals on building their careers.
Whitehouse Cybersecurity Coordinator Howard Schmidt used wit to share his wisdom about healthcare information security in a rambling, folksy keynote address this week. He stressed that healthcare organizations of all sizes need to take security more seriously.
The new federal HIPAA privacy and security rule compliance audits of healthcare organizations and their business associates likely will start later this year once a report on a model for the program is completed, a key federal privacy official says.
Social media "are a data security person's worst nightmare," says Sharon Finney, corporate data security officer at Adventist Health System. So Finney and her team spent more than six months crafting security policies for limited use of the new media.
A critical first step down the path toward HITECH Act compliance is conducting a thorough risk assessment, an official with the agency enforcing compliance says.
Federal HIPAA privacy and security rule compliance audits of healthcare organizations and their business associates likely will start later this year, says Susan McAndrew, deputy director for privacy in the HHS Office for Civil Rights.
Before healthcare organizations can prepare to comply with the HITECH breach notification rule, they must understand its complex details. In an exclusive interview, attorney Deven McGraw sorts through the major provisions in laymen's terms.
She provides detailed guidance on:
The definition of the term...
Career Profiles features tips from senior leaders who have made it to the top of the information security profession. Here they discuss their education, keys to success and proven strategies for advancement.
The shock value of the more than 75 major healthcare information breaches reported to federal authorities so far could be a catalyst for increased funding for security at hospitals and clinics.
The list of major healthcare breaches reported to federal authorities now stands at 77, with about 70 percent stemming from the theft or loss of a computer device or paper records.
Two February incidents are among those recently added to the federal tally of major healthcare breaches. One involves a laptop theft; the other the loss of DVDs.
Draft legislation began circulating through the corridors of the Capitol complex that would establish - in the words of its sponsors - meaningful privacy protections for Internet users, which they say is particularly important as businesses begin to adopt cloud computing.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.