Getting senior executives involved early and making sure they understand the organization's security vulnerabilities are two vital steps in any risk management initiative, says consultant Mark Ford of Deloitte.
In an interview, Ford offers advice on how to:
Win the support of senior executives as well as boards...
John Muir Health, a Walnut Creek, Calif.-based health system, is notifying 5,450 patients about a potential breach of information stemming from the theft of two unencrypted laptop computers.
At an online session to solicit comments on a proposed framework for a new Federal Health IT Strategic Plan, planners asked for additional advice on tactics for ramping up enforcement of existing privacy and security regulations.
The federal government has awarded $267 million in grants to establish another 28 Health Information Technology Regional Extension Centers to educate doctors and others on how to implement secure electronic health records.
A new survey of executives at 250 hospitals found that 19% had experienced at least one security breach in the past 12 months, up from 13 percent in a similar survey conducted in early 2008.
The U.S. Department of Health and Human Services has awarded $60 million in economic stimulus funds under the HITECH Act to four universities for healthcare IT research projects, three of which will address privacy and security issues.
Widespread implementation of encryption is a top priority at Stanford Hospital and Clinics, thanks, in large part, to the "safe harbor" in the HITECH breach notification rule, says Michael Mucha, information security officer.
The firm that has won a $26 million public relations contract from the Department of Health and Human Services for a campaign on healthcare information technology, and related privacy and security issues, stirred up controversy with some of its previous government PR efforts.
Properly securing information technology (IT) infrastructure has never been more critical for organizations in the healthcare industry. Healthcare institutions, plan providers and life sciences organizations alike need to safeguard confidential corporate and patient data from internal and external threats, not only as...
Email continues to be a main source of exposure of protected health information (PHI) and other private data in today's enterprise, but most organizations have yet to deploy technology to prevent costly breaches of PHI. Join this discussion to find out what you need to know about the latest security, privacy and data...
Federal regulators are one small step closer to starting audits of healthcare organizations and their business associates for compliance with the HIPAA privacy and security rules as required under the HITECH Act.
The Office for Civil Rights at the U.S. Department of Health and Human Services has awarded two key...
Organized crime has targeted healthcare organizations for insurance fraud scams. What are the risks? What are the solutions?
Dr. Andrea Allmon, senior director with FICO, discusses:
Insurance fraud trends;
How organizations are most vulnerable;
What to do now to reduce fraud today.
The final version of regulations to carry out the HITECH Act must include far more details on privacy and security to ensure widespread adoption of electronic health records, says William R. Braithwaite, M.D., Ph.D.
Getting senior executives involved early and making sure they understand the organization's security vulnerabilities are two vital steps in any risk management initiative, says Mark Ford of Deloitte.
In an interview, Ford offers advice on how to:
Win the support of senior executives as well as boards of directors...
Many years ago, the Health Insurance Portability and Accountability Act (HIPAA) promised to overhaul the healthcare industry by, in part, mandating protective measures on sensitive healthcare records. The HIPAA Privacy and Security Rules ended up not having the impact many expected.
Years after both rules took...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.