Healthcare Information Security

Patient Privacy News

Ponemon: Healthcare Cyber Attack Averages One Per Month


LAS VEGAS - Healthcare cybersecurity must improve, as organizations average about one healthcare cyber attack per month, according to a recent Ponemon survey. In The State of Cybersecurity in Healthcare Organizations in 2016, Ponemon also found...

Medical Identity Theft Discussed in New RI Legislation


Medical identity theft is just one potential issue that recent Rhode Island legislation hopes to solve. Set to go into effect on June 26, 2016, the new Rhode Island Identity Theft Protection Act requires businesses and organizations of all sizes...

Lessons Learned from 2015 Healthcare Data Breaches


Last year was filled with healthcare data breaches, with the top three alone combining to affect nearly 100 million individuals. Will 2016 hold the same potential threats to covered entities? How can healthcare organizations best prepare for...

How Cybersecurity National Action Plan Affects Healthcare


Earlier this week, President Barack Obama announced the implementation of the Cybersecurity National Action Plan (CNAP) in an effort to further improve the nation’s approach to cybersecurity.   The long-term strategy is designed “to...

How Magruder Hospital Balances PHI Security, Innovation


Ohio-based Magruder Hospital might be a small critical access organization, but that does not mean that it has not taken the necessary steps to keep its PHI security a top priority. Magruder IT Director Dan Thompson told

Senate HELP Draft Brings Health Data Security Concern


Recently proposed health IT and EHR legislation from the Senate Health, Education, Labor, and Pensions (HELP) Committee has brought forth some health data privacy and security concerns from industry stakeholders. The draft legislation was designed...

Utah Dept. of Health Medicaid Data Security Risks Found


The Utah Department of Health (DOH) was found to have certain Medicaid data security risks, according to a recent Office of Inspector General (OIG) report. Along with weaknesses found in a comprehensive information system general controls audit,...

Is There an Ethical Obligation for Health Data Sharing?


Health data sharing can have numerous potential benefits, but according to one group of doctors, there is also an ethical obligation to responsibly share health data. The International Committee of Medical Journal Editors (ICMJE) explained in...

Majority of Americans Say Health Data Sharing Acceptable


Just over half of Americans - 52 percent - said in a recent Pew Research survey that health data sharing is acceptable, while 20 percent stated that it would depend on the particular circumstances of the information being shared. However, age...

FTC Settles Dental Software Patient Data Encryption Case


The Federal Trade Commission (FTC) recently settled a case involving alleged misleading information about how a dental practice software company handled patient data encryption. Henry Schein Practice Solutions, Inc. (Schein) is required to pay...

UMass Lowell, UMMS Launch Secure Health Data System


UMass Medical School (UMMS) and UMass Lowell researchers are collaborating to launch a secure health data system to help patients, researchers, and physicians better transport and store information. The secure system is called Flexware, and is...

Visual Hacking Poses a New Healthcare Data Security Threat


Although the healthcare data security industry is heavily investing in precautionary measures on their technical devices, they are missing a less sophisticated gap in their security efforts: visual hacking. According to 3M, visual hacking is...

OIG Report to Congress Stresses Health Marketplace Security


The Office of the Inspector General (OIG) has released its Semiannual Report to Congress, identifying key areas in which several federal healthcare agencies can improve their security efforts. Specifically, OIG emphasized health marketplace security....

Maintaining Healthcare Data Security in Genomic Data Sharing


Genomic data sharing is becoming an increasingly popular topic, especially as evolving technologies are giving researchers and healthcare providers greater opportunities to take advantage of its potential benefits. However, healthcare data security...

Patient Health Data Second-Most Stolen Data Type, Says Study


Patient health data is one of the most commonly stolen types of data, according to a recent study. The combination of health data and personally identifiable information (PII) is the second-most stolen data type, the TrendLabs 3Q 2015 Security...

Patient Privacy Key Part of Precision Medicine Initiative


President Barack Obama recently announced Privacy and Trust Principles, which included guidance on protecting patient privacy, as part of the larger Precision Medicine Initiative (PMI). The new research efforts will also include guidance in  how...

AMA Examines Patient Privacy in Calif. Supreme Court Case


The American Medical Association (AMA) recently weighed in on a California Supreme Court case debating whether patient privacy was violated following a government agency obtaining an individual’s prescription records without a warrant....

Reviewing the Benefits of Healthcare Data De-Identification


Healthcare data de-identification could bring several potential benefits to healthcare organizations. As more providers begin to connect to HIEs, implement BYOD strategies, or even opt for cloud computing options, it is essential that patient...

EEOC Proposed Rule May Affect Health Data Security


A recently proposed rule from the Equal Employment Opportunity Commission (EEOC) could potentially impact individuals’ health data security, as the rule would expand the type of data collected through employer wellness programs. The EEOC...

NIST Guide Could Assist in Protecting Patient Privacy Online


Protecting patient privacy is an essential aspect to any healthcare organization’s data security plan. However, employees still need to be able to access that data. Being able to properly manage accounts can be critical to ensuring patient...


SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
Data Breaches

Our privacy policy

no, thanks