Privacy and Security

As more providers are using digital data, privacy and security issues have become a greater concern. Protecting confidential patient information is also a priority for IT vendors, who are interested in offering solutions that come equipped with heightened security features. The industry-wide transition to HIPAA 5010 code set comes with heightened emphasis on privacy of patient data content in provider transactions, since 5010 aims to ensure that only the "minimum necessary" personal health information required for business purposes is included in a transaction.

RELATED STORIES:
Privacy hindering EHR progress, say researchers
HHS proposes new privacy, security rules

 
If you're a provider or payer organization with a great story to tell about a patient engagement program that has improved care and reduced costs, here's your chance to share that success -- and learn from your peers.
November 12, 2014
News
Healthcare industry, listen up: You've got a consumer distrust issue on your hands. The majority of American consumers continue to have serious doubts over the privacy and security of their medical records -- so much so that a sizable number of them actually withheld information from care providers over those concerns.
November 5, 2014
News
Raising concerns about security practices with the Obamacare website HealthCare.gov, the U.S. House Science Committee has issued a subpoena to compel U.S. Chief Technology Officer Todd Park to testify about his role in creating the site.
November 3, 2014
News
New York City offers plenty of healthcare and technology jobs, but there's a gap between the work and the skills available, according to a new report from financial services firm JPMorgan Chase.
October 31, 2014
News
Mobile health wearables and sensors present myriad opportunities for improving patient care and increasing patient engagement. They also offer the chance to better manage chronically ill patients remotely. The only problem? It's not that these wearables are scarce. It's that many just aren't secure.
October 31, 2014
News
California state officials this week released its second annual data breach report, and spoiler alert: the numbers for the healthcare industry aren't pretty.
October 30, 2014
News
Among the 71 mobile and telemedicine projects underway at Intermountain Healthcare are a smartwatch clinicians use, the gyrometer given to patients post-operation and the popular social networking tools Facebook, Twitter and Yammer.
October 27, 2014
News
With more than 350 exhibitors on the show floor, including many for the first time, MGMA's exhibit hall is expected to be abuzz with activity and fresh ideas. There's also a "Tweet Street."
October 23, 2014
News
The healthcare industry is swimming in Social Security numbers, thanks to the necessities of patient record management technology. But balancing those requirements with fraud mitigation and privacy protections is proving a big challenge.
October 23, 2014
News
"It isn't out of the realm of the possible" that medical device security flaws could "cause severe injury or death," according to a Department of Homeland Security official investigating devices and other pieces of hospital equipment for weaknesses that could be exploited in a cyberattack.
October 23, 2014
News
Wes Wright, chief information officer of Seattle Children's Hospital, had a couple big reasons for embracing a virtual desktop infrastructure strategy for the 323-bed tertiary care facility. "Speed and ubiquity," he says. But soon he found a bonus.
October 22, 2014
News
For wearable technology to live up to the hype, especially when it comes to healthcare, it will have to be "interoperable, integrated, engaging, social and outcomes-driven," according to PwC.
October 21, 2014
News
Examine the total economic impact that you can realize by using Dell™ Mobile Clinical Computing (MCC). Discover how Tallahassee Memorial HealthCare (TMH) achieved clinical efficiency, data security and IT productivity by implementing Dell MCC.
September 22, 2014
Resource
sites/default/files/resource-media/pdf/total-economic-impact-mcc-solution.pdf
Protect
Learn how to build a risk-stratified response plan to secure medical data whenever a visual privacy incident is reported to limit potential harm to patients and the organization.
August 21, 2014
Resource
sites/default/files/resource-media/pdf/3msdp2301_h4_hc_privacybreach_081314.pdf
Protect
Identify the risks, review healthcare compliance issues, and consider recommended solutions to help protect medical data on mobile devices.
August 21, 2014
Resource
sites/default/files/resource-media/pdf/3msdp2301_h2_hc_compliancerisks_081314.pdf
Protect
Establish security controls to examine how healthcare officials can better address low-tech vulnerabilities like human error and a lack of visual privacy, that can help companies remain compliant with HIPAA regulation.
August 21, 2014
Resource
sites/default/files/resource-media/pdf/3msdp2301_h1_hc_privacyconcerns_081314.pdf
Protect
Patient safety and the reduction of medical errors are key drivers in the healthcare industry today. To address these needs, more and more providers are using laser-printed patient wristbands at the critical juncture of admitting patients to the facility. Wristbands that stay on the patient and remain readable after repeated use and extended treatments need to be easy to print, easy to read, and cost effective to deploy.
July 10, 2014
Resource
sites/default/files/resource-media/pdf/hp_solution_brief_-_gain_efficiences_improve_patient_safety_-_hp_patient_identification_solution.pdf
Protect
A major Southeastern U.S. healthcare system needed to securely issue prescriptions directly from its two electronic medical record (EMR) systems: one for its hospitals and another for its clinics. Secure printing across the entire printer network was vital to reduce the risk of fraud and meet stringent government regulations. The HP Prescription Printing Security Solution was selected to meet this challenge.
July 10, 2014
Resource
sites/default/files/resource-media/pdf/hp_solution_brief_-_secure_simplify_save_-_hp_prescription_printing_solution.pdf
Protect
Uncontrolled print environments in a hospital setting can present a serious risk to patient privacy, profit, institutional security, and profitability. You must protect sensitive information, secure devices, and improve 7x24 device availability in critical clinical environments to provide the care patients need and expect. To gain better control, you need to implement plans that meet industry regulations while also increasing productivity, lowering costs, and providing more flexible scanning and printing solutions for staff and clinicians.
July 10, 2014
Resource
sites/default/files/resource-media/pdf/hp_solution_brief_-_control_safeguard_comply_-_hp_access_control.pdf
Protect
As healthcare leaders work to protect patients, their data, and comply with federal requirements, independent audits routinely expose a common blind spot and springboard for patient data breaches and even misdiagnoses: connected medical devices. From data loss to patient harm, hefty penalties and jail time, learn how to pinpoint and counter the hidden risks that can impair your organization's healthcare delivery, patient data security and compliance.
July 9, 2014
Resource
Do Not Protect
http://himssmediawebinars.com/registration/webinar/acing-audit-how-medical-devices-impact-your-hipaa-meaningful-use-and-fda-compli?affiliatedata=website
Much of the news surrounding healthcare in recent years has centered on the Affordable Care Act (ACA), which radically changes the way healthcare is provided to millions of Americans. Care providers, compliance officers, and legal departments are all too aware that the ACA is only the latest in a series of legislation and regulations to affect the healthcare industry over the past 20 years. Read this white paper and learn how affordable software tools now exist in order to conduct remote investigations quickly without paying a third-party service provider. In addition, you’ll learn how for many mid-sized organization in and around the healthcare industry, these investigations are slow and costly.
June 16, 2014
Resource
sites/default/files/resource-media/pdf/qs_healthcare_exec-brief_060514_approved_gsi.pdf
Protect
The increasing fluidity and proliferation of protected health information (PHI) on the web and mobile devices has created many new avenues for cyber attacks and the theft of personal health information. In fact, the Federal Bureau of Investigation (FBI) just released a warning to the healthcare industry recognizing the vulnerability of electronic health records (EHR). This report offers real insight from healthcare IT executives on the threats targeting healthcare data and the top ten recommendations for maintaining privacy in a mobile environment.
May 29, 2014
Resource
sites/default/files/resource-media/pdf/iht2-10-steps-data-privacy-changing-mobile-world.pdf
Protect
Cloud computing is still a nascent market in the healthcare industry, yet healthcare organizations are beginning to incorporate the ability to use remote servers and networks to store, manage and process data into their short- and long-term plans. This in depth paper with actionable insight from industry leading speakers at the executive briefing is designed to help you navigate issues of moving to the cloud, new models of care, seizing the right opportunities and overcoming barriers.
May 20, 2014
Resource
sites/default/files/resource-media/pdf/verizon_event_briefing_wp.pdf
Protect
HIPAA-compliant hosting can help healthcare organizations address issues in the areas of cost containment, cost predictability, rapid application rollout and expertise utilization. Any healthcare-related organization, including Business Associates of HIPAA Covered Entities, should consider the use of a well-qualified cloud provider that can host patient portals, health information exchanges, email and other services that healthcare organizations must manage. This white paper addresses some of the key issues in healthcare management and how a well-qualified, compliant hosting provider can help organizations to reduce costs and better meet their obligations. Understand the key focus areas on fulfilling Meaningful Use Stage 2 requirements, managing medical image archives, enabling application decommissioning, implementing Disaster Recovery for EHR and EMR, and HIPAA-Compliant Hosting.
May 16, 2014
Resource
sites/default/files/resource-media/pdf/lw_wp_key_issues_in_healthcare_compliance_and_cost2.pdf
Protect
While role-based access control has uses in every industry, healthcare systems in particular can benefit from a proper implementation of these solutions.
August 26, 2013
Blog
As healthcare providers rely more and more on evolving technologies to store and transmit their data, compliance has become an increasingly complex landscape to navigate.
August 2, 2013
Blog
I have been following the news about the National Security Agency (NSA) access to our phone records with great interest. If we as a society don’t sort some of this out, we’ll see a repeat in the health sector a few years from now.
June 26, 2013
Blog
The vision, as described by Amit Singhal, who is in charge of search for Google, is that instead of typing words into a box, we will have conversations with Google, enabling a much more personalized experience. If you apply this thinking to healthcare, several controversies/topics come to the fore.
May 24, 2013
Blog
Every organization is considering “cloud” approaches for their business, yet if you ask “what is cloud” you’ll get a wide range of answers. This variety of cloud options has an impact on healthcare organizations, especially those contemplating a future cloud strategy aligned to regulatory compliance.
May 6, 2013
Blog
If you’re an IT vendor who services healthcare clients, you’re no doubt well-acquainted with HIPAA compliance rules. And chances are that lately you’ve been hearing rumblings about the new HIPAA Omnibus rule.
April 26, 2013
Blog
All organizations have a business imperative to control risk. For healthcare companies that corporate responsibility extends to the protection of ePHI within their organization.
April 3, 2013
Blog
To put it mildly, the transition to EHRs comes freighted with a whole host of expectations.
February 7, 2013
Blog
Were you run over by the HIPAA bus yesterday? The Omnibus final rule finally landed with a crunch last night. If you check out #HIPAAbus, you'll see my notes from my blaze through with page numbers.
January 18, 2013
Blog
t’s time for some New Year’s resolutions; and they have nothing to do with eating right, losing weight or exercising. Instead, they have everything to do with protecting against the organizational and financial stresses of data breaches.
January 8, 2013
Blog
As I travel the country, I find that CIOs everywhere are struggling with BYOD in particular but remote access more generally.
November 30, 2012
Blog
Just two and a half years after hosting a workshop on the HIPAA Privacy Rule's de-identification standard, OCR has issued its "Guidance Regarding Methods for De-identification of Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule."
November 29, 2012
Blog