It's difficult to know where sensitive patient information may be lurking in user files. But some healthcare organizations are finding ways to detect where the information resides so they can protect it. Find out how.
A key aim of the Next Generation Cyber Initiative has been to expand the FBI's ability to quickly define 'the attribution piece' of a cyberattack to help determine an appropriate response, the FBI's Richard McFeely says.
"We will bring in best practices for HIPAA and technology best practices in terms of encryption in how we handle data and share it with stakeholders," says Curt Kwak CIO of Wash. State Health Benefit Exchange.
The Department of Veterans Affairs is not taking adequate steps to protect the privacy of sensitive information that's shared with researchers, according to a new OIG report. Find out what the OIG recommends.
Human genome sequencing can support groundbreaking research leading to improved treatments. But before genetic testing can become common, privacy issues need to be tackled, says Lisa M. Lee, who heads a presidential advisory panel.
CISOs increasingly are asked to manage both information security and risk. What new skills and tools do they need to juggle the dual role? David Sherry, CISO of Brown University, shares his views.
Because the nation lacks a single patient ID system, misidentification of patients is a danger when providers exchange records. That's why HIMSS has asked Congress to commission a patient data matching study.
Imagine sitting in a bar, as a stranger snaps a photo of you, and then uses that image to find out who you are using facial recognition technology. It's the type of practice that the staff of the U.S. Federal Trade Commission wants to discourage.
State health insurance exchanges now in the formative stages should consider security practices widely used in online banking, says Bryce Williams, CEO at Extend Health, a commercial online health insurance exchange.
Researchers are studying how security best practices for healthcare organizations need to evolve. What current and emerging IT issues are they considering in their work? Researcher Carl Gunter explains.
A new report by a presidential commission says there are too many discrepancies in privacy regulations related to patients' genomic data. Find out what the panel recommends.
What's missing from remarks by Defense Secretary Leon Panetta, Senate Majority Leader Harry Reid and others is how the stalemate that led to the filibuster of the Cybersecurity Act could be resolved. Will the election make a difference?
"The lack of clear disclosures to consumers about how their location data are used and shared means that consumers lack adequate information to provide informed consent about the use of these data," the Government Accountability Office says.
Suspending the HITECH Act's electronic health record incentive program, as suggested by four GOP congressmen, is a misguided idea that could hamper efforts to cut healthcare costs and jeopardize data security.
Healthcare providers often fail to conduct comprehensive, timely risk assessments, as required by regulators. But security expert Kate Borten says they can leverage new guidance to help get the job done.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.