Healthcare Information Security

PHI

Is PHI Security Strong Enough in the Workplace?

by Elizabeth Snell

Workplace wellness programs are on the rise, but does that mean that PHI security is being put at risk? PHI security is often an issue relegated to healthcare providers and insurers. However, as health and wellness programs increase in popularity...

Virginia and California Face PHI Protection Problems

by Stephanie Reardon

As technology continues to evolve, it should come as no surprise that healthcare facilities are finding more ways to store and transmit protected health information (PHI). However, it is crucial that facilities keep sensitive data secure. Virginia...

Patient Privacy Concerns Arise Over Cal INDEX HIE

by Elizabeth Snell

Consumer Watchdog has raised concerns over a California HIE and potential patient privacy concerns. When implementing a new electronic health record (EHR), patient privacy and security issues should be a top priority for healthcare organizations....

Healthcare Employee Mistakenly Donates CDs with PHI

by Elizabeth Snell

PHI was accidentally exposed after a healthcare employee mistakenly donated CDs with patient information. What started as a goodwill attempt to help children with their art projects, quickly turned into a potential healthcare data breach. A health...

Top 10 Healthcare Data Breaches for 2014

by Elizabeth Snell

No facility wants to experience a healthcare data breach. Not only can patients’ protected healthcare information (PHI) be put at risk, but the organization’s reputation will be on the line. It can take time for a healthcare facility to recover....

Personal Data of 200,000 Compromised by Former Employee

by Elizabeth Snell

A former employee improperly accessed the personal data of approximately 200,000 individuals. Often discussed on this website is the importance of healthcare organizations – and facilities that store individual’s healthcare information –...

Why Healthcare Cybersecurity Breaches Cost More than Others

by Elizabeth Snell

A recent study underlines the costly recovery process that can stem from healthcare cybersecurity breaches. As previously discussed, healthcare cybersecurity breaches can have a costly and lengthy recovery process. Facilities must not only grapple...

Should HIPAA Compliance Let Researchers Access Patients’ PHI?

by Elizabeth Snell

AMIA recommended that HIPAA compliance should allow researchers to gain access to patients’ PHI without their permission. Allowing health researchers to access patients’ PHI without their permission could be beneficial, according to the...

Top Tips for Keeping Patients’ Healthcare Data Protected

by Stephen Treglia

Instinctively, we think of our financial data as the most likely target of a cyber attack, while healthcare data is increasingly becoming more valuable. Healthcare data breaches have demonstrated a real appetite among cybercriminals for protected...

Health Data Security Valued Over Convenience, Says Report

by Elizabeth Snell

More consumers value their health data security over the ability to easily access that information. The majority of US consumers value health data security over the convenience of access to that information, according to a recent PwC Health Research...

PHI Exposure Case of 1,500 Patients Settled

by Elizabeth Snell

Approximately 1,500 patients were notified of PHI exposure last May at a Missouri facility. Last May, more than 1,500 women in Missouri had their protected health information (PHI) compromised after their personal records blew out of a dumpster...

Six Ways to Stay HIPAA Compliant and Keep PHI Safe

by Jay Atkinson

As your organization’s CIO, do you know whether your business is HIPAA compliant or if it has access to protected health information (PHI)? If you don’t know the answers, it’s critical for you to find out.  Non-compliance...

New Image Sharing Program Keeps PHI Safe

by Elizabeth Snell

As technology continues to develop, patients are gaining greater control in how they receive medical care and how their protected health information (PHI) is transferred. Everything from patient portals to secure messaging systems are changing...

Visionworks Hit with Second Data Breach in One Month

by Elizabeth Snell

A healthcare facility again experienced a data breach due to a missing computer server with unencrypted patient information. For the second time in one month, Visionworks was involved in a potential healthcare data breach. Moreover, patients’...

Healthcare Data Breach Drama Continues for UMass Memorial

by Elizabeth Snell

A Massachusetts hospital is facing a civil lawsuit from a patient whose PHI was potentially exposed in a healthcare data breach. The University of Massachusetts Memorial Medical Center (UMMMC) of Worcester, Mass. is facing a civil lawsuit over...

Healthcare Security Breach Hits Washington Hospitals

by Elizabeth Snell

A former employee gained unauthorized access to several hospitals, creating a healthcare security breach. Three Washington hospitals are working to fix their computer systems after a healthcare security breach led to the theft of 35 computers...

Is Health Data Security a Top Concern for Everyone?

by Elizabeth Snell

A recent poll shows that patients are not overly concerned about their health data security. As technology continues to evolve, and healthcare organizations implement more connected options, it only makes sense that providers are working to strengthen...

Stolen PHI Leads to Medical Identity Theft in Detroit

by Elizabeth Snell

Patients’ PHI was stolen from two Detroit-area hospitals. The thieves allegedly used the information to file false tax returns. Approximately 1,400 people had their protected health information (PHI) stolen from two metro Detroit hospitals,...

Laptop with PHI Stolen from Brigham and Women’s Doctor

by Elizabeth Snell

Brigham and Woman’s Hospital (BWH) notified patients that an incident in September could potentially have exposed some individuals’ protected health information (PHI). A BWH physician’s laptop and cell phone were stolen during an armed...

VA Cybersecurity Vulnerabilities Still Exist, Says GAO

by Elizabeth Snell

A report shows that the VA has not done enough to mitigate potential cybersecurity risks. The Department of Veterans Affairs (VA) has not fully addressed all of its cybersecurity vulnerabilities, according to a recent US Government Accountability...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks