HealthcareInfoSecurity has launched its inaugural Healthcare Information Security Today survey gauging top trends, threats and priorities for hospitals, clinics, health plans and integrated delivery systems.
If enacted,the bill that's heading to the House floor would require increased coordination and prioritization of federal cybersecurity R&D activities and the development of cybersecurity technical standards. It also would strengthen cybersecurity education and talent development and promote industry partnership...
A new concept called Privacy by Redesign, by Dr. Ann Cavoukian, Privacy Commissioner of Ontario, Canada, looks to bring privacy into systems that are already developed.
The U.S. government wants to move many services online, but the inability to authenticate customers and develop Trusted Identities has kept agencies from making the transition. This is a problem that could soon be resolved, says Mike Ozburn, principal of Booz Allen Hamilton.
"These are projects that were already...
Key steps to prepare for a HIPAA compliance audit include updating a risk assessment, carefully documenting all privacy and security policies and checking all security controls.
A comprehensive electronic health records system enabled St. John's Regional Medical Center to continue aiding patients in the wake of a tornado that tore through the hospital, providing an important lesson in business continuity.
Beth Israel Deaconess Medical Center in Boston is notifying more than 2,000 of its patients about an unusual potential health information breach incident involving a computer virus that transmitted data to an unknown location.
In a second legal action in the wake of a breach incident involving health insurer WellPoint Inc., a California court has announced preliminary approval of a class action settlement.
"Privacy and security controls ... are complementary and mutually reinforcing in trying to achieve the privacy and security objectives of organizations," NIST Senior Computer Scientist Ron Ross says.
Social media, mobility and cloud computing are new areas of risk for organizations, and risk managers need to go back to the fundamentals of understanding the information they are protecting, says Robert Stroud, ISACA's international vice president.
A Georgia hospital has informed 7,500 patients that they may have been affected by a breach incident involving the theft of personal information that could have been used to commit federal income tax fraud.
The Department of Veterans Affairs is offering a $50,000 prize to a developer who successfully demonstrates the expansion of the use of the "Blue Button" application to enable veterans to download their patient information from providers outside the VA.
A revised, downsized plan to launch a national database of certain federal healthcare claims data is being implemented despite ongoing concerns from privacy advocates.
The Department of Health and Human Services has published a proposed rule that describes privacy, security and many other standards for web-based state insurance exchanges called for under the healthcare reform law.
More organizations that run health information exchanges are offering patients the opportunity to provide more specific levels of consent for the exchange of their records, a new survey by the advocacy group eHealth Initiative shows.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.