Containerization - it's the latest strategy for securing the critical data accessed by remote workers and mobile devices. How is the concept deployed? David Lingenfelter of Fiberlink offers insight.
Privacy and security leaders, including John Houston at University of Pittsburgh Medical Center, are evaluating the changes needed to comply with the HIPAA omnibus final rule. Find out what's on their to-do lists.
A Montreal computer science student accessed, without authorization, an IT system to check if a software vulnerability he discovered had been remedied. This case raises the question: When, if ever, is such unauthorized action justified?
As the National Institutes of Health ramps up research projects involving human genomes, electronic health records and other sensitive data, it's exploring the best ways to protect that data, says research director Eric Green, M.D., PhD.
The new omnibus rule makes it clear that business associates must comply with HIPAA. And the latest additions to the federal health data breach tally put a spotlight on why some BAs need to improve patient data protection.
Attendees at the first of two "town hall" online meetings about secure health information exchange said standards are needed to help build trust that patient information will remain private, secure and reliable. Find out more about their top concerns.
The "ban the box" trend will gain momentum for background screening in 2013, says screening expert Les Rosen, who analyzes the movement to remove criminal-conviction questions from job applications.
New guidance on when to notify authorities of a breach is one of the most significant provisions in the HIPAA omnibus final rule, experts say. Find out what other provisions are drawing attention.
As part of the Obama adminstration's gun control efforts, HHS is reminding healthcare providers that HIPAA allows them to disclose patient health information to law enforcement if they believe the patient is a danger to themselves or to others.
The failure to pass privacy legislation in the U.S. hasn't stopped regulatory agencies from taking matters into their own hands - a pattern that will continue throughout 2013, says a panel of attorneys.
The long overdue final HIPAA omnibus rule has been released. The package includes extensive modifications to the HIPAA privacy, security and enforcement rules as well as an updated version of the HIPAA breach notification rule.
Commenters reacting to proposed HHS requirements for Stage 3 of the HITECH Act electronic health record incentive program raise a wide range of privacy and security concerns. Find out what the AMA and others had to say.
Convenience is nice, but don't equate making work easier with productivity - especially to the tune of $28 billion a year for the U.S. federal government, which a just-released survey contends.
Following a breach, one healthcare organization banned the use of cell phones by volunteers. Was this a proactive measure or an overreaction? Kate Borten and other security experts offer analysis.
To repel the onslaught of cyberattacks against organizations, security leaders are debating the merits of the "hack back" defense. Legal experts discuss the pros and cons of this emerging strategy.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.