Federal regulators have released initial findings from a study of possible ways to improve patient identity matching practices to bolster patient safety while protecting individuals' privacy.
A federal district court judge's ruling that a National Security Agency program collecting metadata from telephone calls could be unconstitutional suggests that the law hasn't kept pace with changing technology.
Most fraud on the Internet is linked to unsecured identities, which is why a new global identification framework is needed, says Paul Simmonds, who heads a coalition working on a framework model.
A letter from eight prominent online companies to President Obama and Congress calls for reform of government surveillance programs, outlining concerns about the way the NSA monitors online and telephone communications.
The Department of Health and Human Services should make several revisions in its plans for a revamp of the HIPAA accounting of disclosures rule and conduct pilot tests before implementing a final rule, an advisory panel recommends.
The privacy and security risks posed by the Internet of Things will pose a growing challenge for IT security professionals who manage online transactions and relationships, says ISACA's Robert Stroud.
Three recent privacy incidents at health insurance exchanges, including one in Vermont, involved consumers getting the wrong person's data. Privacy experts offer insights on lessons learned.
National policies regarding cybersecurity can have a positive or negative effect on global trade efforts, says Allan Friedman, research director of the Brookings Institution's Center for Technology Innovation.
Researchers have a new option for securely accessing more than 400 billion federal healthcare records via a virtual data center, says Niall Brennan of the Centers for Medicare and Medicaid Services.
A federal advisory panel will recommend that the Department of Health and Human Services take an incremental approach to implementing a revised HIPAA accounting of disclosures rule. Find out about tentative plans for fine-tuning the rule.
For risk managers, an often overlooked step for minimizing supply chain risks is to continually monitor outsourcers and other third parties to address critical security issues, says the Information Security Forum's Steve Durbin.
Google has agreed to a $17 million settlement with 37 states and the District of Columbia over its unauthorized placement of cookies on computers using Apple Safari Web browsers, which the states claim was a privacy violation.
Although businesses understand the benefits of sharing cyber-threat information with law enforcement, they often let perceived legal constraints prevent them from collaborating, says Mary Galligan, a former FBI investigator.
Now that business associates are directly liable for HIPAA compliance, they need to ensure they perform a thorough risk analysis to identify gaps in their controls, says consultant Andrew Hicks.
When it comes to safeguarding the privacy and security of healthcare information, smaller clinics, as well as patients who use telehealth technologies, face considerable challenges because of a lack of expertise, says researcher David Kotz.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.