A draft of a Federal Health IT Strategic Plan provides a roadmap that the next national coordinator for health IT may use in spearheading many efforts, including protecting the privacy of healthcare information.
There are some encouraging signs that stage two criteria for the HITECH Act's electronic health record incentive program will include substantial privacy and security requirements.
The Privacy and Security Tiger Team is scrambling to finish its recommendations for stage two requirements for the HITECH Act's electronic health record incentive program.
The federal list of major health information breaches that have occurred since September 2009 included 249 incidents affecting nearly 8.3 million individuals as of Tuesday. But the total affected could surpass 10 million once details about the recent Health Net breach are added.
Doug Fridsma, M.D., Ph.D., of the HHS Office of the National Coordinator for Health IT, compares and contrasts the security approaches of two federal health information exchange projects.
All organizations - including federal agencies - must leverage technologies that exist today to secure online transaction systems for E-Gov. Until now, fragmented silos of security technologies have been used to protect individual applications, data, or users. In a world of Webconnected smart phones and interactive...
Insurer Health Net is notifying 1.9 million individuals that their healthcare and personal information may have been breached as a result of nine server drives missing from a California data center managed by IBM.
Joy Pritts of the Office of the National Coordinator for Health IT says the office intends to develop standards that would give patients the ability to exclude clinicians from accessing certain portions of their electronic health records.
Hussein Syed, director of IT security at Saint Barnabas Healthcare System, explains why the organization shifted from software-based to hardware-based encryption.
A recent healthcare information breach incident involving Blue Cross and Blue Shield of Florida offers a reminder that even routine tasks, like addressing mail, can trigger a security incident.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.