Healthcare Information Security
  • HIPAA Security Rule Requires Secure Disposal of ePHI-Laden Devices

    August 8, 2018 - The HIPAA Security Rule requires HIPAA covered entities and business associates to implement policies and procedures regarding the secure disposal and re-use of electronic devices and media containing ePHI so that ePHI cannot be retrieved, advised the July 2018 OCR Cybersecurity Newsletter. OCR stressed that improper disposal of electronic devices and media puts the ePHI stored on them...

  • Smart Kids Thermometer Coughs Up Digital Health Data to Hackers

    August 1, 2018 - Ivy Health Kids Thermometer, a smart and portable arm thermometer for babies and small children that connects over Bluetooth to a mobile device app, failed to protect sensitive digital health data of children from hackers, according to testing by CI4S Ltd. on behalf of security firm vpnMentor. Researchers found that hackers could easily break into the thermometer and identify the...

  • HHS Pushes for Changes to HIPAA Privacy Rule, 42 CFR Part 2

    July 30, 2018 - In the next few months, HHS plans to issue requests for information (RFIs) about changing the HIPAA Privacy Rule and 42 CFR Part 2 to make it easier for doctors, hospitals, and payers to coordinate in delivering value-based care and fighting the opioid addiction crisis. “Current interpretations of the two privacy laws…are not just impeding value-based arrangements in...

  • CMS Would Drop Security Risk Analysis from Interoperability Score

    July 27, 2018 - CMS is proposing that the Protect Patient Health Information objective and its associated measure, security risk analysis, would no longer be scored as a measure but would act as a prerequisite for a participating clinician to earn any score in the Promoting Interoperability performance category. The proposed rule, published July 27 in the Federal Register, sets forth changes to the...


Today's Top Stories

Healthcare Data Security Angst Drives Biometrics Market Growth

Concerns about healthcare data security and privacy are fueling rapid growth in the healthcare biometrics market, which is forecast by Verified Market Intelligence to grow at a 19.1 percent CAGR through 2025. The market is expected...

Cybersecurity Vulnerabilities Lurk in Philips IntelliSpace System

ICS-CERT is warning about cybersecurity vulnerabilities in Philips’ IntelliSpace Cardiovascular (ISCV) cardiac image and information management systems that could enable an attacker to escalate privileges on the ISCV server and...

OCR Levies Close to $80M in HIPAA Privacy Rule Fines

OCR has assessed close to $80 million in fines in 55 cases of HIPAA Privacy Rule violations since the rule took effect in April 2003, according to data on the HHS website. OCR has received 184,614 HIPAA complaints and has initiated 902...

McAfee Uncovers Cybersecurity Vulnerabilities in Patient Monitors

McAfee Labs has discovered cybersecurity vulnerabilities in a protocol used by patient monitors to communicate with central monitoring stations. If hackers could exploit the weakness in the RWHAT protocol used by connected medical devices...

Medtronic Criticized for Lax Medical Device Security Response

Researchers Billy Rios and Jonathan Butts criticized Medtronic’s response to medical device security issues in its products during a presentation at the BlackHat security conference held last week in Las Vegas. The researchers said...

Oklahoma Government in Row Over Alleged HIPAA Violation

Two branches of Oklahoma’s government are embroiled in a controversy over whether the Oklahoma Department of Veterans Affairs committed a HIPAA violation when it allowed VA medical aides to access patient medical records using their...

3.15M Records Exposed by 142 Healthcare Data Breaches in Q2 2018

In the second quarter of 2018, 3.15 million patient records were compromised in 142 healthcare data breaches, according to the Protenus Breach Barometer. A discouraging 30 percent of privacy violations involved repeat offenders,...

View all stories

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks