The Healthcare Information Trust Alliance has unveiled an updated version of its Common Security Framework reflecting the latest regulations and security practices.
When the HITECH Act was enacted early in 2009, much was made of its provisions calling for tougher enforcement of the HIPAA privacy and security rules. But we're still waiting for ramped-up enforcement to begin.
The new law also directs NIST to collaborate with industry to develop cloud computing standards, formalizing NIST's cloud computing activities begun in the past two years.
Federal authorities have unveiled details for a permanent program to certify electronic health records software for the HITECH Act EHR incentive program.
The Office of the Inspector General will scrutinize the privacy and security policies of the Department of Health and Human Services, as well as the details of the HITECH Act electronic health record incentive program.
Hospitals and physicians, effective Jan. 3, can apply for the HITECH Act electronic health record incentive payments. But will the program be a successful catalyst?
As 2010 draws to a close, federal regulators have a long list of unfinished business in drafting regulations and launching programs to protect patient privacy and bolster information security, as mandated under the HITECH Act.
Surescripts will serve as a certifier of e-prescribing, privacy and security modules of electronic health records for the HITECH Act
EHR incentive program.
The National Institute of Standards and Technology issues two special publications: SP 800-119, Guidelines for the Secure Deployment of IPv6 and SP 800-135, Recommendation for Application-Specific Key Derivation Functions.
The most important healthcare information security trend for the year ahead is the rush to implement electronic health records while taking advantage of all their security features, says Dixie Baker, a well-known security expert who's advising federal regulators on policy issues.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.