A former employee of Kaiser Permanente, the largest HMO in the United States, posted confidential information about 140 patients on her blog. Stories of damaging security breaches resulting from intentional or inadvertent exposure of outbound content are all too familiar. They can result in breaches that risk your...
Healthcare is currently being shaped by several major trends, from migration to EHR's, to HIE, caregiver mobility, social media, cloud computing, cost reduction pressure and others. These trends promise compelling benefits, but also drive significant privacy and security risks. Breaches and other security incidents...
Celebrity snooping at healthcare facilities highlights an alarming - and often unchecked - trend: PHI privacy violations committed by current or former employees, contractors, and other insiders. Protecting patient privacy comes down to more than policies and regulations. What's needed is a way to enforce PHI...
The increase in the availability and quality of medical images is enabling healthcare providers to successfully diagnose and resolve more patient problems than ever before. The downside is the demand placed on IT organizations to retain numerous medical images with huge file sizes in a reliable, secure, scalable, and...
Health information exchange (HIE) - the electronic movement of health-related information among organizations according to nationally recognized standards - has the potential to transform nearly every aspect of healthcare delivery in this country. Recent policies have helped fund major growth in the world of...
Security professionals at organizations adopting cloud computing solutions must put in place policies, processes and relationships that will result in keeping enterprise data safe. This industry perspective recommends:
Adopting high-level information security policies as well as granular procedures and standards...
Virtually every business acquires, uses and stores personally identifiable information (PII) about its customers, employees and partners. These organizations are expected to manage this private data appropriately and take every precaution to protect it from loss, unauthorized access or theft. Misusing, losing or...
Maintaining the security of patient data is a complex proposition that affects every employee of a healthcare facility, every area of its IT system, and all vendors, partners, and insurers that work with the healthcare provider.
While many facilities are working toward achieving full compliance with HIPAA,...
Businesses are faced with an assortment of security risks. Among the most prevalent risks are network attacks and infected computing systems (servers and end-user endpoints). The consequences of loss of use - that is, network failures and out-of commission computing systems - are just too great for any business to...
Securing confidential patient health data for compliance with HIPAA and HITECH is now more important than ever. Successful compliance with these standards can involve many tools, IT components and business practices at significant cost to healthcare organizations. Even with all these initiatives in place, the...
Many years ago, the Health Insurance Portability and Accountability Act (HIPAA) promised to overhaul the healthcare industry by, in part, mandating protective measures on sensitive healthcare records. The HIPAA Privacy and Security Rules ended up not having the impact many expected.
Years after both rules took...
Healthcare information and specifically Electronic Patient Healthcare (ePHI) has been in the news recently and featured as part of healthcare reform. The Health Information Technology for Economic and Clinical Health (HITECH) component of the American Reinvestment and Recovery Act (ARRA) of 2009 has not received as...
When private medical records are breached, healthcare service providers suffer damage to their brand, reputation, loss of trust from their patients, and severe financial repercussions. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) mandates that appropriate administrative, technical, and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.