Federal advisers heard concerns from healthcare providers, EHR software vendors and others this week about the cost and impracticality of a proposed requirement to offer patients an access report listing caregivers who had viewed their records.
Despite the government shutdown, Stage 2 of the HITECH Act financial incentive program for the meaningful use of electronic health records kicks off Oct. 1. Learn more about the privacy and security provisions and how to prepare.
Top executives at healthcare organizations must take the lead in overcoming a culture that portrays privacy and security as barriers, says Joy Pritts, chief privacy officer at the Office of the National Coordinator for Health IT.
As the Sept. 23 enforcement deadline for HIPAA Omnibus approaches, an error that many business associates are making is thinking that compliance can be achieved with a simple checklist, says consultant Andrew Hicks.
After months of delay, a hearing has been scheduled to discuss a controversial accounting of disclosures proposal that calls for giving patients the right to a full report outlining who has accessed their records.
Improper disposal of protected health information poses significant risks, as recent breach incidents demonstrate. That's why organizations need to do a better job vetting disposal companies and verifying that data or devices are actually destroyed.
Get up to speed on the dos and don'ts of breach response. Plus, have a little fun along the way, as Mike Bruemmer, Vice President of ExperianÂ® Data Breach Resolution, and Tom Field, Vice President of Editorial for Information Security Media Group, act out a mock conversation between a data breach client and privacy...
With promises of ramped up HIPAA enforcement by federal regulators, and changes in the breach notification rule under the HIPAA Omnibus Rule, it's time for organizations to get serious about insider risks.
The Ponemon Institute, sponsored by Experian® Data Breach Resolution, conducted the "Securing Outsourced Consumer Data." The study surveyed over 700 individuals in organizations that transfer or share consumer data with vendors.
Download the "Securing Outsourced Consumer Data" and learn:
The frequency of data...
The cost of a data breach or privacy violation goes far beyond compromised records to include hard-dollar expenditures for breach notification, credit monitoring, regulatory fines and legal fees. Not to mention the immeasurable cost of reputation loss.
To avoid these losses, security leaders are increasingly...