A new U.K. government report accuses social networks of serving as a "safe haven for terrorists," inflaming what some see as tense relations in the post-Snowden era between the British government and Silicon Valley.
Legal experts are analyzing the potential national impact of a Connecticut Supreme Court ruling that plaintiffs can sue for negligence if a healthcare provider violates HIPAA regulations for protecting patient privacy.
Apps for wearable devices that are designed to track a user's pulse rate, blood-oxygen level or location may be leaking that data during transmission, Symantec security researcher Candid WÃ¼eest warns in a Black Hat Europe briefing.
A federal advisory workgroup that makes privacy and security recommendations to the the Office of the National Coordinator for Health IT has officially re-launched with a new name, new members and several new hot topics to tackle in the coming months.
Amsterdam is again playing host to the annual Black Hat Europe information security gathering, and presenters have promised to cover everything from privacy flaws in wearable computers to two-factor authentication system failures.
Some privacy experts are expressing concern about a report that social media giant Facebook is planning to enter the healthcare market with health apps and patient support communities. Find out the nature of their worries.
Preventing patient record "snooping" is an ongoing challenge for hospitals in their HIPAA compliance efforts. But with the intensifying attention on Ebola cases, hospitals need to up their game in protecting patient privacy.
The American Health Information Management Association has released a framework of eight key principles to help guide healthcare organizations in their information governance. Important elements of data privacy and security are woven throughout.
Healthcare providers that decide to accept consumer-generated health or fitness data from wearable devices, such as the upcoming Apple Watch, need to develop a plan for protecting the privacy of that information, says privacy attorney Scot Ganow.
When patient data is used for secondary purposes, such as research, it must be de-identified. But is this process consistently reliable in protecting patient privacy? Two experts describe the challenges.