A Congressman is citing the recent theft of an unencrypted laptop containing health information on 616 veterans as evidence that the Department of Veterans Affairs is not doing enough to protect information.
All healthcare organizations should create a detailed plan for meeting the requirements of the HITECH breach notification rule, says attorney Gerry Hinkley.
In an interview, Hinkley describes key steps hospitals, clinics and other should take, including:
Designating someone, such as the HIPAA privacy officer, to...
Healthcare organizations developing or updating information technology contingency plans for responding to emergencies, such as natural disasters, soon can take advantage of new guidance from the National Institute of Standards and Technology.
Although the list of major healthcare breaches reported to federal authorities so far does not yet include a large-scale hacking incident, organizations should nevertheless take preventive measures to avoid such attacks, a federal privacy expert says.
The best way to persuade physicians to take information security seriously is to explain the business risks involved, says Robert Tennant, senior policy analyst with the Medical Group Management Association, the trade group for physician group practice administrators.
The new federal HIPAA privacy and security rule compliance audits of healthcare organizations and their business associates likely will start later this year once a report on a model for the program is completed, a key federal privacy official says.
Social media "are a data security person's worst nightmare," says Sharon Finney, corporate data security officer at Adventist Health System. So Finney and her team spent more than six months crafting security policies for limited use of the new media.
Before healthcare organizations can prepare to comply with the HITECH breach notification rule, they must understand its complex details. In an exclusive interview, attorney Deven McGraw sorts through the major provisions in laymen's terms.
She provides detailed guidance on:
The definition of the term...
Career Profiles features tips from senior leaders who have made it to the top of the information security profession. Here they discuss their education, keys to success and proven strategies for advancement.