While it's good to see more privacy and security details included in the final version of the Federal Health IT Strategic Plan, much work remains to ensure patient information is protected when it's exchanged.
Faced with criticism for a lack of details and vision in its original draft of the Federal Health IT Strategic Plan 2011-2015, federal authorities have beefed up some privacy and security details in the final version.
In an attempt to make it easier to compare the privacy practices of personal health records vendors, the Office of the National Coordinator for Health Information Technology has created a model privacy notice.
Leon Rodriguez, formerly chief of staff and deputy assistant attorney general for the Department of Justice Civil Rights Division, is the new director of the Department of Health and Human Services' Office for Civil Rights.
Responding to a request for ideas on how to update the Common Rule, which provides guidelines for research on human subjects, the Privacy and Security Tiger Team says a key issue is how to define "research."
Provisions in legislation introduced by Sen. Richard Blumenthal, D-Conn., target companies that store online data for more than 10,000 people to assure their customers' personally identifiable information is protected.
The Office of the National Coordinator for Health Information Technology has formally launched Query Health, a project to test standards for querying data from electronic health records to conduct research.
Whether you're preparing for the upcoming HIPAA compliance audits, pondering a move to cloud computing or developing a social media policy, it pays to get privacy and security tips from experts in the field.
A repentant SparkyBlaze wants to go legit, leaving behind the hacktivism he helped foster as a member of Anonymous and start a career in the U.S. as a ethical hacker. As proof, he's offering advice to protect IT from hackers.
Facial recognition technology could prove to be an effective way to authenticate individuals seeking entry to secured buildings or databases storing sensitive information. But the biometric technology already is being abused, and IT security managers employing facial recognition should be careful to encrypt the...