The Department of Veterans Affairs is not taking adequate steps to protect the privacy of sensitive information that's shared with researchers, according to a new OIG report. Find out what the OIG recommends.
Human genome sequencing can support groundbreaking research leading to improved treatments. But before genetic testing can become common, privacy issues need to be tackled, says Lisa M. Lee, who heads a presidential advisory panel.
Because the nation lacks a single patient ID system, misidentification of patients is a danger when providers exchange records. That's why HIMSS has asked Congress to commission a patient data matching study.
Imagine sitting in a bar, as a stranger snaps a photo of you, and then uses that image to find out who you are using facial recognition technology. It's the type of practice that the staff of the U.S. Federal Trade Commission wants to discourage.
State health insurance exchanges now in the formative stages should consider security practices widely used in online banking, says Bryce Williams, CEO at Extend Health, a commercial online health insurance exchange.
Researchers are studying how security best practices for healthcare organizations need to evolve. What current and emerging IT issues are they considering in their work? Researcher Carl Gunter explains.
What's missing from remarks by Defense Secretary Leon Panetta, Senate Majority Leader Harry Reid and others is how the stalemate that led to the filibuster of the Cybersecurity Act could be resolved. Will the election make a difference?
"The lack of clear disclosures to consumers about how their location data are used and shared means that consumers lack adequate information to provide informed consent about the use of these data," the Government Accountability Office says.
Suspending the HITECH Act's electronic health record incentive program, as suggested by four GOP congressmen, is a misguided idea that could hamper efforts to cut healthcare costs and jeopardize data security.
Healthcare providers often fail to conduct comprehensive, timely risk assessments, as required by regulators. But security expert Kate Borten says they can leverage new guidance to help get the job done.