Most House members voted for the America COMPETES Reauthorization Act, but with few Republicans supporting it, the measure failed to muster the two-thirds vote required to pass under rules that brought the bill back to life.
A new Dartmouth College study illustrates the risks involved in using peer-to-peer networks as well as the dangers of storing patient information in spreadsheets and documents outside of electronic health records.
In an interview, Daniel advises practices to "bake in" security technologies and practices from the start of an EHR implementation. He advises practices to ask records software companies tough questions about privacy and security issues, including:
A Congressman is citing the recent theft of an unencrypted laptop containing health information on 616 veterans as evidence that the Department of Veterans Affairs is not doing enough to protect information.
All healthcare organizations should create a detailed plan for meeting the requirements of the HITECH breach notification rule, says attorney Gerry Hinkley.
In an interview, Hinkley describes key steps hospitals, clinics and other should take, including:
Designating someone, such as the HIPAA privacy officer, to...
Healthcare organizations developing or updating information technology contingency plans for responding to emergencies, such as natural disasters, soon can take advantage of new guidance from the National Institute of Standards and Technology.
Although the list of major healthcare breaches reported to federal authorities so far does not yet include a large-scale hacking incident, organizations should nevertheless take preventive measures to avoid such attacks, a federal privacy expert says.
The best way to persuade physicians to take information security seriously is to explain the business risks involved, says Robert Tennant, senior policy analyst with the Medical Group Management Association, the trade group for physician group practice administrators.