Michael Frederick, chief information security officer at Baylor Healthcare System in Dallas, is using the HITRUST Common Security Framework to help ease the task of complying with multiple regulations.
In an interview, Frederick, who heads a staff of 22, describes how the framework is helping him achieve several...
Every year, the Healthcare Information and Management Systems Society's conference offers a crash course on all aspects of applying information technology in healthcare. This year's show, to be held Feb. 28-March 4 in Atlanta, will offer more content than ever on privacy, security, compliance and risk management...
Choosing the right form of encryption is essential when attempting to comply with the HITECH Act, says consultant Rebecca Herold.
In an interview, Herold:
Stresses that healthcare organizations can gain an exemption from the HITECH requirement to report data breaches only if they use specific NIST-approved...
The federal government is seeking a contractor to help assess healthcare cybersecurity risks in the public and private sectors.
The contractor also will create and test risk mitigation strategies. The results of the project will help support development of federal policies.
The International Biometric Performance Conference entitled Performance, Evaluation and Specification of Biometric Technologies will bring together biometric users, technology providers, integrators and evaluators.
Joy Pritts, J.D., has been named the first chief privacy officer within the Office of the National Coordinator for Health Information Technology. ONC is a unit within the U.S. Department of Health and Human Services that is carrying out the provisions of the HITECH Act, including beefed up information security...
A federal advisory committee has recommended keeping the information privacy and security requirements untouched in pending criteria for demonstrating meaningful use of electronic health records to receive Medicare and Medicaid incentive payments.
Khalid Kark, vice president at Forrester Research, recently wrote an in-depth report on healthcare information security in which he described five key principles.
In an interview, Kark discusses each principle, including:
Take a risk-based approach and look beyond regulatory compliance, focusing instead on...
Should software developers be held liable for their programming errors? A consortium of international cybersecurity experts says yes - and will present its plan for such a program on Tuesday. But at least one dissenting voice calls the effort "counterproductive and silly."
Faced with the threat of much stiffer penalties for data security violations and ramped-up enforcement at the federal and state levels, many hospitals are just starting to pay serious attention to security, contends security consultant Kate Borten. But they must go far beyond investing in new technologies to develop...
The North Carolina Healthcare Information and Communications Alliance Inc. has prepared several free documents to assist healthcare organizations that are tackling information security issues.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.