Healthcare Information Security

HIPAA and Compliance News

ONC Releases Electronic Health IT Privacy, Security Guide

by

The Office of the National Coordinator for Health Information Technology (ONC) released an updated version of its guide on electronic health IT privacy and security earlier this week. The guide outlines ways for covered entities to properly integrate...

Understanding HIPAA Regulations and Their Applications

by

CHICAGO – Understanding HIPAA regulations is key for healthcare providers, hospitals, and any other covered entity. However, HIPAA was implemented before many of today’s current technologies were in use, and the specifics can sometimes be...

Why Reducing Insider Threats Must Remain a Top Priority

by

CHICAGO – Healthcare privacy and security needs are on the minds of attendees and presenters at this week’s HIMSS conference, and a recent report highlights why reducing insider threats should be a key driver for facilities. According...

Why Data Breach Prevention Will Steer HIMSS15

by

The annual HIMSS conference and exhibition covers a variety of healthcare IT topics and issues. However, in the wake of large scale data breaches and continuous discussion and debate over federal and state healthcare regulations, one of the major...

HIPAA Compliance, Cybersecurity Top HIMSS15 Topics

by

Even without large data breaches, the healthcare industry must remain current on the latest HIPAA compliance trends and best approaches to comprehensive cybersecurity. The annual HIMSS conference will tackle these issues, among many others, head...

HIPAA Regulations Create Communication Obstacle, Says Survey

by

HIPAA regulations are a necessity for covered entities, but if a recent survey is any indication, they could also be creating issues for providers. The majority of surveyed providers – 61 percent – stated that HIPAA regulations pose...

Let HIMSS15 Be Your Guide for Health Data Security, Privacy

by

Editor’s note: The following is a sponsored contribution from ESET North America. Even before the Anthem and Premera breaches grabbed the spotlight, these last twelve months have been momentous for security in healthcare. With big developments...

Current HIPAA Requirements Sufficient, AHA Tells ONC

by

The current HIPAA requirements are enough to support the improvement of the healthcare infrastructure to better support secure data sharing in support of clinical care, according to the American Hospital Association (AHA). In a letter to the...

De-Identification of Data: Breaking Down HIPAA Rules

by

The de-identification of data is an important part of healthcare technology, especially as the use of EHRs and HIEs becomes more prominent. The HIPAA Privacy Rule states that once data has been de-identified, covered entities can use or disclose...

PHI Data Breach Announced Following Audit

by

Life Care Center of Attleboro in Massachusetts posted two separate announcements on its website about a potential PHI data breach after the company that stores its patient records could not find certain documents. Iron Mountain archives patient...

Top 6 Health Data Breaches for 2015 Involve Hacking

by

We are just three months into 2015, and two large scale health data breaches have already taken place. The Anthem data breach affected approximately 78 million individuals, while Premera Blue Cross’ incident could impact nearly 11 million members...

ONC Workgroup Talks HIPAA Regulations, Interoperability

by

The Office of the National Coordinator (ONC) Health Information Technology (HIT) Privacy & Security Workgroup met earlier this month to further discuss the ONC Interoperability Roadmap, and members brought up concerns about HIPAA regulations,...

Premera Data Breach Leads to Lawsuits, Lawmaker Concern

by

The Premera data breach that potentially put the sensitive information, including PHI, of 11 million individuals at risk has now led to five class action lawsuits. The suits were filed in U.S. District Court in Seattle on behalf of Premera customers...

Privacy Laws, Data Breaches Top IT Priorities for 2015

by

Privacy laws and making preparations against data breaches are not just relegated to the healthcare industry, and are in fact some of the top priorities for IT leaders, according to Protiviti’s 2015 IT Priorities Survey. Security and privacy...

HIPAA Compliance in the Cloud: Breaking Down HIPAA Rules

by

HIPAA compliance in cloud computing is becoming an increasingly important topic as more covered entities (CEs) begin to consider this option for data storage. Even as cloud computing technology evolves, it is essential that CEs – and their...

Data Breach Notification Bill Fails to Pass N.M. Senate

by

The New Mexico Senate did not pass a recently proposed data breach notification bill, even though the bill was unanimously passed by the House earlier this year. HB 217 required that businesses notify customers if their personally identifiable...

Patient PHI Compromised by Florida Hospital Employees

by

No healthcare facility wants patient PHI compromised, let alone by its own employees. However, that is the situation that Florida Hospital is currently working through, according to a facility statement. Two employees, who have since been terminated,...

Healthcare Data Breaches Can Push Patients Away, Says Survey

by

Healthcare data breaches can be devastating for patients and the healthcare facility that was attacked. The organization could face severe penalties from the Department of Health & Human Services (HHS) if it is deemed that it violated HIPAA,...

What Are the Legal Concerns in a HIPAA Risk Assessment?

by

No healthcare organization wants to find itself in legal trouble when it comes to conducting a HIPAA risk assessment. Facilities must ensure that they are adhering to all federal requirements, as well as any state or local laws. That way, the...

How Does Stage 3 Meaningful Use Affect Health Data Privacy?

by

Health data privacy and security measures need to remain a top priority for covered entities, and CMS’ recent proposal for Stage 3 Meaningful Use does not forget that fact. Numerous administrative and technical changes were suggested, and while...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks