< >
  • Recent Health IT Security Articles

    • CMS Updates Security Risk Analysis Procedure

      Healthcare organizations need to remain up-to-date on the guidelines for proper security risk analysis. Conducting a security risk analysis is part of the core objectives that healthcare organizations must meet for Stage 1 and Stage 2 Meaningful Use. ...

    • Factoring Security Into Health Data Disclosure Management

      Kyle McElroy, AVP of Health Information Management at IASIS Healthcare, discussed IASIS's disclosure management focuses with HealthITSecurity.com. As IASIS Healthcare continues to architect its system more toward ensuring that there is accurate inf...

    • HIPAA Business Associate Agreements: What Needs to be Included?

      Healthcare organizations should take the time to review the regulations for HIPAA Business Associate Agreements. The deadline for all HIPAA business associate agreements (BAAs) to be up to date and in line with the regulations set forth by the Omnibus...

    • EY Principal: Strong EHR Security Essential for Healthcare

      Eileen Erdos, a principal in the EY Fraud Investigation & Dispute Services’ Life Sciences practice, spoke with HealthITSecurity.com about the importance of EHR security. Without strong EHR security, it could be extremely difficult to not only pr...

    • Are Small Healthcare Facilities Prepared for Data Breaches?

      A recent study found that smaller healthcare facilities could potentially be at a greater risk for data breaches. Regardless of a healthcare provider’s size, it can be susceptible to data breaches if the proper precautions are not taken. Even if all...

    • Healthcare Data Breach News: Pa. Server Hacked; Records Found Dumped

      A Pennsylvania healthcare service said it had a potential data breach incident and medical records were also found outside a Michigan facility. A Pennsylvania healthcare service confirmed last week that it had a data breach incident where personal he...

    • Fla. Court: HIPAA Not Violated in Malpractice Reform

      A federal appeals court ruled that it is not a HIPAA violation for physician defendants to have equal access to plaintiffs’ health information. Physician defendants can have equal access to plaintiffs’ health information, as it is not in violation...

    • AMA: MU Secure Messaging Criteria Should Be Optional

      Meaningful Use secure messaging was one of several issues discussed in a blueprint created by the American Medical Association last week. The Centers for Medicare and Medicaid Services (CMS) should make the "view-download-transmit," transitions of car...

    • HIPAA Best Practices: Acceptable Use Policies, Team Training

      Creating Acceptable Use Policies (AUP) and then training your employees is essential for security at your healthcare organization. In an earlier post, we discussed the steps to performing a Risk Assessment. Once you’ve determined the risks within yo...

    • Oregon Health Insurance Exchange Suffers 18th Breach

      An Oregon health insurance exchange (HIE) has had 18 security breaches in the last six months, with the most recent one occurring when documents containing PHI was sent to the wrong patient. According to the Associated Press, Ann Migliaccio applied ...

  • News Archives