Physicians who use social media to discuss their work, even without naming patients, risk privacy violations, a recent case in Rhode Island clearly illustrates. The case is an eye-opener for all clinicians about social networking risks.
Privacy advocates in Maine are supporting a proposed state law that would require patients opt in to participate in the state's health information exchange before clinicians can access their records via the HIE.
The Social Security Administration sold the information in a database of deceased individuals that erroneous contained the Social Security numbers, dates of birth, full names and ZIP codes of living people, the inspector general reports.
The ongoing effort to enable the secure exchange of health information from coast to coast recently got a very important boost when five well-known healthcare organizations joined forces to serve as trailblazers.
A consortium of five leading healthcare organizations hopes to demonstrate the secure national exchange of health information, says James Walker, M.D. of Geisinger Health System.
State agencies transferred information containing unencrypted, personal information to unsecured servers between January and May 2010, but the exposure was not discovered until two weeks ago, Texas Comptroller Susan Combs says.
Sens. John Kerry and John McCain introdcued legislation that would balance individual privacy rights while allowing businesses to collect consumer information that could be used to market products and services.
Joy Pritts of the Office of the National Coordinator for Health IT says the office intends to develop standards that would give patients the ability to exclude clinicians from accessing certain portions of their electronic health records.
Most furloughed federal employees would have had to turn in their BlackBerries and other mobile devices in a U.S. government shutdown. Just as well, using the technology could have resulted in an employee landing in the slammer.
After the revelation of Operation Aurora, the term began to take on a different meaning. "In essence," IBM's X-Force report says, "APT became associated with any targeted, sophisticated or complex attack regardless of the attacker, motive, origin or method of operation."
Three recent breach incidents, each involving the loss or theft of back-up drives, illustrate that some organizations are doing a better job than others in informing consumers about the steps they're taking to prevent more breaches.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.