A federal advisory panel has prepared recommendations for security and privacy best practices to use when a patient's representative, or proxy, is authorized to view, download or transmit electronic health records, such as through a portal.
Nationwide health information exchange is achievable in the next three years, but matching patients to the right records is a critical security, privacy and patient safety issue that first must be addressed, says new ONC leader Karen DeSalvo, M.D.
An address by FBI Director James Comey at the RSA security conference seems to equate civil liberties and privacy. But when he offers an example of balancing Americans' rights with cybersecurity, he mainly refers to the civil liberties, not privacy.
Simple credentials, such as passwords, are a hacker's best friend, says Phillip Dunkelberger of Nok Nok Labs, a founding member of the FIDO Alliance. That's why the alliance is working to reduce reliance on passwords by enabling advanced authentication.
Editor's Note: Excerpts of this interview appear in ISMG's Security Agenda magazine, distributed at RSA Conference 2014.
Privacy should be built into the design of all healthcare information technology and related processes, says Michelle Dennedy, who's writing a book on the concept of "privacy by design."
Healthcare providers are turning to patient portals to provide remote access to electronic health records. But they face challenges when giving parents access to the records of minors of a certain age, says attorney Adam Greene.
A government watchdog plans a variety of activities to scrutinize the data security practices of healthcare providers, including hospitals' security controls over medical devices. It also will take a close look at the HealthCare.gov website.
Where do organizations fail when defining privacy, and how can they best leverage technology to ensure privacy protection? Michelle Dennedy of McAfee and Trevor Hughes of the IAPP share perspectives.
Here's what to expect in the cybersecurity framework, a catalog of tools to be released Feb. 13 that's designed to help critical infrastructure owners develop information security protection programs.
Here's a sampling of the many sessions at RSA 2014 that will provide timely insights for security specialists in the government sector on such topics as vetting foreign technologies and implementing the new cybersecurity framework.
Bipartisanship - a rare commodity on Capitol Hill - manifested itself with the House Homeland Security Committee's approval of a bill aimed to help buttress the cybersecurity of the nation's critical infrastructure.
Six technology companies that sued the government to allow them to disclose secret requests for customer information have made their first revelations under terms of an agreement reached late last month with the government.
A federal advisory panel is seeking feedback as it prepares to evaluate security and privacy policy recommendations for representatives authorized to view, download and transmit electronic health records on behalf of patients.
Kaiser Foundation Health Plan has reached a settlement with the California attorney general over its response to an unusual breach of employees' personal information that occurred in 2011.
They're thought-leaders. Movers and shakers. VIPs and MVPs within their industry sectors. And their actions weigh heavily on how information security is practiced, taught and tested. These are 2014's Influencers.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.