Thor Ryan, chief security officer at the Alaska Department of Health and Social Services, offers lessons learned as a result of his organization's $1.7 million settlement following a HIPAA compliance investigation triggered by a small breach incident.
A federal agency is offering a free online training program that provides useful insights on protecting information privacy. Learn how this clever training "game" works.
Federal authorities have dropped plans to draft regulations setting voluntary "rules of the road," including privacy and security guidelines, for health information exchanges to help pave the way for the national exchange of information.
Sen. Susan Collins, who, like President Obama, backs the Cybersecurity Act, cautions the president against issuing an executive order to protect the nation's critical IT, saying it would send an signal that congressional action isn't urgently needed.
A criminal and public health investigation in New Hampshire involving a former hospital worker who allegedly infected dozens of patients with Hepatitis C is turning into a patient privacy debate.
An advisory panel wants a multi-factor authentication requirement included in Stage 3 of the HITECH Act electronic health record program. Find out under what circumstances that requirement would apply.
Consumer advocates are praising many of the privacy and security provisions of the final rules for Stage 2 of the HITECH Act EHR incentive program but lamenting some omissions. Find out the details.
In a merger, communication is essential for ensuring security and privacy challenges are met, says Christopher Paidhrin of PeaceHealth Southwest Medical Center, whose parent company recently went through a merger and will soon undergo another.
To address the security and privacy challenges magnified by the velocity, volume and variety of big data, the Cloud Security Alliance has formed a big data working group. What are the group's objectives?
What's the best way to prepare to comply with HITECH Stage 2 privacy and security requirements? Federal privacy officer Joy Pritts advises healthcare organizations to start by conducting a thorough risk assessment.
While the Office of the National Coordinator for Health IT continues work on mobile device security guidance for smaller healthcare organizations, a researcher offers insights on steps these providers can take now to improve security.
Which data architecture model for health information exchanges - centralized, federated or hybrid - is the most secure? Some consumer advocates strongly favor the federated model. What do HIE leaders and security experts say?
Nine organizations in western Pennsylvania are taking a customized approach to health information exchange that leverages the security technologies they already have in place, says Chris Carmody, who heads the effort.
The final rules for Stage 2 of the HITECH electronic health record incentive program contain multiple provisions regarding privacy and security. Find out what experts have to say about the merits of the new requirements.
News of Google's $22.5 million settlement with the FTC has come and gone, yet privacy issues reflected in the case remain a concern. How should organizations react, and what steps should they take now?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.