EHR, Meaningful use, ICD-10, Electronic Health Records

Patient Privacy News

How Does Data De-Identification Affect Clinical Research?

July 30, 2015 - Health data de-identification can give healthcare organizations an opportunity to present data for research purposes in a way that does not compromise patient privacy. Clinical research in both the healthcare and pharmaceutical industries are beginning to adopt this approach to data security and health data sharing. Protecting patient privacy throughout that entire process is key, according...


Articles

Health Data Sharing Bill Passes House in 344-77 Vote

In a 344-77 vote, the US House of Representatives passed a health data sharing bill that has been hotly debated by various healthcare organizations. The 21st Century Cures bill is intended to overhaul drug development by giving researchers...

Is Health Data Security At Risk In 21st Century Cures Bill?

While the recent 21st Century Cures bill has many lawmakers, agencies, and healthcare organizations standing behind it, there are still opponents that believe individuals’ health data security will be at increased risk because of the legislation....

Utah Medical Privacy Bill Receives Pushback from DEA

A medical privacy bill went into effect in Utah earlier this year, requiring police agencies to get a warrant from a judge before searching the state’s controlled-substance database. However, the US Drug Enforcement Administration may sue...

Patient Privacy Top CHIME Recommendation to Senate Group

Protecting patient privacy and ensuring health data security were just two of several recommendations the College of Healthcare Information Management Executives (CHIME) put forth to the Senate Committee on Health, Education, Labor and Pensions...

CMS Health Data Privacy Not Compromised in Increased Access

The Centers for Medicare and Medicaid Services (CMS) announced earlier this week that it will now allow innovators and entrepreneurs to access its data, including information like Medicare claims. The policy change is part of CMS’ commitment...

VA PHI Incidents Increase 178% in April

After a positive few months that showed a decrease in PHI incidents, the Department of Veterans Affairs (VA) saw a drastic uptick in reported data security events, according to its latest report to Congress. In March, the VA stated that 383 veterans...

Coast Guard Needs Better PHI Security, Says OIG Report

The US Coast Guard (USCG) must do a better job in its PHI security measures, according to a recent report from the Office of the Inspector General (OIG). Specifically, USCG lacks a strong organizational approach to resolving privacy issues, the...

Why PHI Security Cannot be Forgotten When Entities Move

PHI security is an essential aspect of healthcare data privacy for covered entities of all sizes. Each facility is different and will therefore benefit from different security measures. However, ensuring that PHI does not fall into the wrong...

ONC Privacy, Security Workgroup Expresses Stage 3 MU Concerns

There are several patient privacy and security concerns related to the proposed Meaningful Use Stage 3 rule, according to the Office of the National Coordinator (ONC) Health Information Technology (HIT) Privacy & Security Workgroup. Earlier...

Why Information Blocking Could Hinder PHI Security

PHI security is an increasingly important issue, especially as more providers implement electronic medical records and the push for nationwide interoperability continues. However, health information blocking and healthcare privacy rules could...

New Data Breach Notification Bill Lets States Keep Own Laws

Several Democratic senators have introduced a national data breach notification bill that will allow states to keep their own notification laws if they have more strict policies already in place. The Consumer Privacy Protection Act was introduced...

Phishing Attack Affects 3,300 Partners HealthCare Patients

Yet another phishing attack was announced this week, potentially affecting 3,300 patients at Partners HealthCare System, Inc. According to a company statement, the Massachusetts-based facility learned on November 25, 2014 that employees had fallen...

Exposed Medical Records Potentially Puts Patients At Risk

Healthcare facilities must ensure they have the latest privacy and security measures in place to prevent exposed medical records and work toward keeping data breach risks to a minimum. Along with the latest technological safeguards, covered entities...

Phishing Scam, Stolen Laptop Lead to Potential Data Breaches

Healthcare data breaches can be caused from a variety of incidents, such as an email phishing scam, misplaced medical records, and lost or stolen mobile devices. Without a comprehensive security plan and extensive understanding of HIPAA regulations,...

Ill. Data Breach Law Passes Senate, Includes Medical Data

The Illinois Senate passed a data breach law that now includes medical and health insurance data in its definition of “personal information.” The Personal Information Act, or SB 1833, was previously in place, but the new version amends certain...

Will NAIC Cybersecurity Regulations Affect Healthcare Industry?

The Cybersecurity (EX) Task Force of the National Association of Insurance Commissioners (NAIC) announced that it adopted new cybersecurity regulations, designed to help protect sensitive consumer information. The cybersecurity regulations highlight...

Second Email Phishing Scam Hits Ascension Health Facility

Another email phishing scam was reported at an Ascension Health facility, but it has not yet been said whether the two incidents are related. Seton Family of Hospitals, a division of Seton Healthcare Family (“Seton”), announced on...

How Rush Medical Stays HIPAA Compliant, Uses Cybersecurity

Staying HIPAA compliant is not always an easy task, especially as new technological options develop, such as cloud computing, mobile devices, and EMRs. Rush University Medical Center has altered its cybersecurity measures over the last few years...

PHI Compromised in Email Phishing Scam

No healthcare organization, whether a provider or insurer, wants to have PHI compromised. However, even with the necessary security measures in place and thorough employee training programs, incidents can still occur. That is the case at an Indiana...

X

Sign up for our free HealthITSecurity.com newsletter and stay up to date with tips and advice on:

HIPAA
BYOD
Data Security
VDI
Cloud Security

Our privacy policy

no, thanks