In the five years since the HITECH Act was signed into law, there have been some major successes and disappointments concerning health information security and privacy, says Joy Pritts of the Office of the National Coordinator for Health IT.
As 10 regional health information exchanges in New York become interconnected into a statewide network, consistency in core privacy and security policies is proving essential, says David Whitlinger, executive director of the statewide initiative.
Privacy and security are vital components of all major projects that the Office of the National Coordinator for Health IT has under way, says Karen DeSalvo, M.D., the new head of the office.
The Government Accountability Office's Gregory Wilshusen is an empathetic IT security auditor, saying he understands why agencies don't always follow his recommendations. Read why.
Malcolm Harkins has a unique role. He oversees both security and privacy for global technology vendor Intel. What tips does he offer individuals who seek to build careers in either discipline - or both?
Paul Egerman and other HIT Policy Committee members approved new recommendations for best practices concerning healthcare providers giving proxy access to patients' electronic health information.
Privacy advocate Deven McGraw is leaving the Center for Democracy & Technology to become a partner at a Washington law firm. She will retain her federal advisory roles.
Information security and privacy work in healthcare environments often requires a depth of specialized knowledge and competency that can be validated through the help of professional credentialing, says CISO Sean Murphy.
A politically conservative watchdog group has filed a lawsuit in an attempt to get answers to its questions about the security of HealthCare.gov, the website for Obamacare. Meanwhile, HHS says the site has had no security incidents.
The Security Industry Association has released an updated version of its privacy framework, outlining best practices to use when deploying evolving electronic security technologies.
Manufacturers of a wide variety of devices that link to the Internet can improve security by turning to processes IT has used for nearly a generation, says Tony Sager of the Council on Cybersecurity.
Information security and privacy work in healthcare environments often requires a depth of specialized knowledge and competency that can be validated through the help of professional credentialing, says CISO Sean Murphy.
The No. 1 reason Congress, after five years of intensive efforts, has yet to enact comprehensive cybersecurity legislation is differences over how much liability protection to grant businesses to get them to share cyberthreat information.
Matching patients to all the right electronic records and complying with privacy rules that differ from state to state are among the toughest ongoing challenges that health information exchanges face, according to a new GAO report.
Bowing to strong public concerns about privacy, President Obama and a bipartisan group of House members separately introduced plans to eliminate the National Security Agency's bulk collection of citizens' phone records.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.