To address the security and privacy challenges magnified by the velocity, volume and variety of big data, the Cloud Security Alliance has formed a big data working group. What are the group's objectives?
What's the best way to prepare to comply with HITECH Stage 2 privacy and security requirements? Federal privacy officer Joy Pritts advises healthcare organizations to start by conducting a thorough risk assessment.
While the Office of the National Coordinator for Health IT continues work on mobile device security guidance for smaller healthcare organizations, a researcher offers insights on steps these providers can take now to improve security.
Which data architecture model for health information exchanges - centralized, federated or hybrid - is the most secure? Some consumer advocates strongly favor the federated model. What do HIE leaders and security experts say?
Nine organizations in western Pennsylvania are taking a customized approach to health information exchange that leverages the security technologies they already have in place, says Chris Carmody, who heads the effort.
The final rules for Stage 2 of the HITECH electronic health record incentive program contain multiple provisions regarding privacy and security. Find out what experts have to say about the merits of the new requirements.
News of Google's $22.5 million settlement with the FTC has come and gone, yet privacy issues reflected in the case remain a concern. How should organizations react, and what steps should they take now?
Healthcare organizations need to rethink security best practices and tap new technologies as a result of the growth in health information exchange and the use of mobile devices, says researcher Carl Gunter.
The two final rules for Stage 2 of the HITECH Act electronic health record incentive program don't include firm data encryption mandates. But they come very close, indeed. And that's an important step forward.
A former emergency department employee of Florida Hospital Celebration allegedly inappropriately accessed more than 760,000 patient records to find traffic accident victims. Find out the details about his arrest.
Accountable Care Organization participants that are sharing information while collaborating on patient care must keep privacy and security top-of-mind, says Bill Spooner, CIO at Sharp HealthCare, an ACO participant.
Microsoft's announcement that the next version of its web browser would feature "do not track" by default has revived this privacy debate. How should privacy professionals approach this discussion?
At St. Dominic-Jackson Memorial Hospital in Mississippi, a proactive breach prevention strategy has dramatically reduced privacy violations involving nosy healthcare workers inappropriately accessing medical records.
The University of Texas MD Anderson Cancer Center has reported its second data breach in recent weeks involving an unencrypted mobile device. Find out the details.
The Office of the National Coordinator for Health IT is studying use of mobile devices in small healthcare environments. The goal: new mobile security guidance that will be released in 2013.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.