Healthcare Information Security

Patient Privacy News

Healthcare Privacy, Security Measures Included in ONC Draft

by

A better way to share healthcare information, while also maintaining healthcare privacy, is one of the key aspects in the Department of Health and Human Services’ Office of the National Coordinator for Health Information Technology’s (ONC)...

Should More Patients Worry About Healthcare Data Security?

by

An organization should always have the state of its healthcare data security as a top priority. Especially as technology evolves and more facilities connect to HIEs, implement new EHRs and potentially even consider telehealth, it is essential...

Understanding HIPAA Compliance in Emergencies

by

Every year there are numerous reports of flu-related deaths, as well as other illnesses. Most recently, Ebola was a hot topic, especially in terms of HIPAA compliance. Patients deserve privacy, but doesn’t the public have a right to know...

Discussion Begins Over National Data Breach Notification Law

by

The House Subcommittee on Commerce, Manufacturing, and Trade held a hearing this morning to discuss what should be included in a national data breach notification law. Earlier this month, President Barack Obama announced his legislation, The...

FTC Report Calls for Better Privacy and Security Practices

by

As more organizations, including those in the healthcare sector, implement connected devices into daily workflow, it is essential that they have the necessary privacy and security practices in place, according to a recent report from the Federal...

Top Tips for Better Healthcare Security in 2015

by

No one wants to be on the receiving end of a data breach. Regardless of the environment or organization, a security breach can spill over into business functionality, an organization’s reputation, and even impact the customer (or in healthcare,...

Protecting Patient Privacy Top Priority, Says HealthCare.gov

by

Protecting patient privacy is something that healthcare organizations must continuously keep track of, ensuring that their security measures do not fall behind. Whether the data is being stored or transferred, it is critical that facilities take...

Potential Healthcare Data Breaches in NY and Calif

by

With potential healthcare data breaches impacting well-known companies such as Sony Pictures, the importance of data security and safeguards has taken the spotlight. Healthcare facilities should view this as an opportunity to crack down on their...

FTC Healthcare Data Breach Case v. LabMD Continues

by

The Federal Trade Commission (FTC) will be able to proceed with its enforcement action against the testing laboratory LabMD for an alleged healthcare data breach that occurred a few years ago. The original FTC complaint filed in 2013 stated that...

Why HIPAA Privacy and HIPAA Security Rules are Needed

by

The federal Health Insurance Portability and Accountability Act of 1996 (HIPAA) is hardly a new concept in the healthcare industry. However, as technology evolves, it is important that facilities of all sizes continue to adhere to HIPAA and are...

Healthcare Cybersecurity Gets Boost from HITRUST, Deloitte

by

The need for better healthcare cybersecurity measures has been an issue making headlines recently, especially with President Barack Obama announcing a cybersecurity bill earlier this month. The Health Information Trust (HITRUST) Alliance hopes...

Better EHR Certification Security Measures Needed, Says AMA

by

The American Medical Association (AMA) is at the forefront of a group of healthcare organizations pushing for better EHR certification security measures, along with other recommendations for changes in the EHR certification program. One of the...

PHI Safety Compromised After Texas Laptop Theft

by

The PHI safety of some Sunglo Home Health Services patients could potentially be at risk after a laptop was stolen from the Harlingen, Texas-based facility. The burglar broke into a van in the Sunglo parking lot, according to a KRGV report. After...

Secure Messaging Services Valued by Younger Patients

by

Secure messaging services are not only a requirement of Stage 2 Meaningful Use, but are also increasingly sought after by younger patients, according to a recent survey. As physicians work toward meeting various federal requirements for healthcare...

Healthcare Privacy Concerns Still Exist with Gov. Site

by

There are still potential healthcare privacy concerns on HealthCare.gov, according to a recent Associated Press report. Specifically, third-party tech firms could have access to individuals’ information after they apply for coverage on the...

Potential Patient Privacy Violations in Mass. Emails

by

Patient privacy violations can occur in numerous ways. Healthcare organizations must remain vigilant in how sensitive data is stored and transmitted to patients, whether it is paper files or electronic information. A failure to adhere to administrative,...

Report Discusses Best Practices for Securely Sharing Data

by

Sharing clinical trial data is an important aspect for healthcare, but the key is to ensure that facilities are securely sharing data, according to a recent report from the Institute of Medicine (IOM). Increasing scientific knowledge is the ultimate...

Health Data Sharing at Forefront of Genetics Deal

by

There are definite benefits to health data sharing, such as furthering certain types of medical research or even finding new ways to reduce healthcare costs. However, it is still essential that patient data security remains a top issue as well,...

NY Proposes New Data Security Law, Includes Health Info.

by

New York Attorney General Eric Schneiderman recently proposed a new data security law that would ensure that compromised healthcare information would also be cause for data breach notification. Companies are only required to notify of a potential...

HIPAA Violation, Records Dump Expose Patient Data

by

A HIPAA violation can occur when a healthcare organization does not adhere to administrative, technical or even physical safeguards that have been put in place. Firewalls, data encryption measures, and employee training on proper disposal of...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks