One problem tracking IT security employment is the dearth of information. Even the most trustworthy organization in collecting employment data, the Bureau of Labor Statistics, furnishes infosec data it cautions aren't reliable.
The Health IT Policy Committee plans to make recommendations for privacy and security changes in the proposed Stage 2 rules for the HITECH Act electronic health record incentive program.
Rules for Stage 2 of the HITECH Act electronic health record incentive program are a work in progress, so there's still time to comment on the privacy and security provisions.
The proposed rules for Stage 2 of the HITECH Act electronic health record incentive program "are going to bring a lot of new and challenging privacy and security issues to the forefront," says attorney Adam Greene.
A new committee will update and create policy measures designed to protect personal health information that's shared using a dozen health information exchanges in New York that are being linked in a statewide exchange.
As enterprises spend frugally on IT security, cybercriminals aren't, and that presents big problems for organizations working feverishly to secure their digital assets, says Steve Durbin, global vice president of the Information Security Forum.
Today's threat landscape is challenging enough. But what happens when organized crime adopts the techniques developed by hacktivists? Learn more about the top 10 threats to security by 2014.
The Health Information Trust Alliance is seeking participants in a new working group that will help incorporate privacy requirements into the HITRUST Common Security Framework.
Organizations and leaders seeking to assure the privacy of their customers should implement privacy by design in the development process, privacy lawyer Alan Friel says.
The FTC proposes that privacy protections be built at every stage in developing online products and consumers be given the option to decide what information is shared about them and with whom through a do-not-track system.
The ECRI Institute recently published a report on controlling the risks involved in using social media in healthcare. Read on to discover insights on how to address risks and prevent breaches.
Although the Obama administration's recently announced Consumer Privacy Bill of Rights shouldn't be seen as the "be-all, end-all," says privacy and data security lawyer Lisa Sotto, they are an important step forward in getting industries and leaders to start thinking about privacy more seriously.
Many healthcare organizations are ramping up their use of mobile devices before they have appropriate privacy and security policies, procedures and technologies in place, some experts say.
Patients in western New York soon will test-drive a tablet-based application designed to educate them about their choices in granting consent to have their records exchanged among providers.
NIST's latest guidance adds controls that reflect the rapidly changing computing environment, but the fundamentals of implementing controls haven't changed, Senior Fellow Ross says in a video interview.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.