Privacy and Security

As more providers are using digital data, privacy and security issues have become a greater concern. Protecting confidential patient information is also a priority for IT vendors, who are interested in offering solutions that come equipped with heightened security features. The industry-wide transition to HIPAA 5010 code set comes with heightened emphasis on privacy of patient data content in provider transactions, since 5010 aims to ensure that only the "minimum necessary" personal health information required for business purposes is included in a transaction.

RELATED STORIES:
Privacy hindering EHR progress, say researchers
HHS proposes new privacy, security rules

 
To help organizations protect their data assets from the increasing number of cyber attacks, the Commerce Department's National Institute of Standards and Technology this week released a cybersecurity framework groups can use to create, assess or improve comprehensive cybersecurity programs.
February 14, 2014
News
Two Midwest health information exchanges, Tiger Institute Health Alliance and Lewis and Clark Information Exchange, are now able to share the data of 2.5 million patients across Missouri and Kansas.
February 13, 2014
News
Last month, the Identity Theft Resource Center produced a survey showing that medical-related identity theft accounted for 43 percent of all identity thefts reported in the United States in 2013. According to HHS, the theft of a computer or other electronic device is involved in more than half of medical-related security breaches.
February 11, 2014
News
When talking HIPAA privacy and security, the numbers do most of the talking.
February 6, 2014
News
In one of the biggest HIPAA security breaches reported, hackers accessed a server from a Texas healthcare system, compromising the protected health information of some 405,000 individuals.
February 5, 2014
News
The ONC's Health IT Policy Committee's Privacy and Security Tiger Team is calling for public comment on privacy and policy concerns surrounding patients giving access to their health information.
February 4, 2014
News
The Department of Health and Human Services has made changes to the Clinical Laboratory Improvement Amendments of 1988, giving patients and their designees direct access to laboratory test reports.
February 3, 2014
News
If you're shirking your security systems' obligations all to save a few pennies, better think again. Chances are, it will end up costing much more down the road -- a whopping $1.6 billion more.
February 3, 2014
News
A Wisconsin health insurance group has notified nearly 42,000 of its members that their protected health information may have been compromised following a HIPAA privacy breach.
January 31, 2014
News
As the electronic health record becomes "just another app," more and more providers are setting their sights on an array of complex future needs. An IDC Health Insights report sees big changes coming for care delivery in 2014 and beyond.
January 30, 2014
News
An Alberta, Canada-based medical group has come under fire this week after it announced that the health records of some 620,000 patients have been compromised in a data breach that reportedly went undisclosed for months.
January 24, 2014
News
Hackers have successfully gained access to the protected health information of thousands after hacking into an Ohio-based medical supply company's server back in March.
January 20, 2014
News
Organizations are consuming software-as-a-service applications at an ever-accelerating rate. While the advantages of SaaS applications are many, so are the potential pitfalls of unauthorized access. As these applications become increasingly popular, the need to manage access SaaS-hosted information becomes even more crucial. Security, compliance reporting and ease of access must be balanced to ensure that information in the cloud is protected without impacting your organizations ability to serve patients, healthcare professionals, and business partners.
March 22, 2013
Resource
sites/default/files/resource-media/pdf/netiq_wp_extending_access_control_to_cloud_usv.pdf
Protect
Given the risks throughout today's complex threat and regulatory landscapes, your need to effectively and securely manage access to critical resources has never been greater. You need to know exactly who has access to what resources and if that access is appropriate. This is as true for the healthcare industry as it is for every other, highly regulated industry. As threats become more sophisticated, so does the speed with which your organization must respond to them.
March 22, 2013
Resource
sites/default/files/resource-media/pdf/white_paper_identity_and_access_governance_bringing_business_and_it_toge.pdf
Protect
The only thing that is constant is change. This old adage has never been truer for the healthcare industry than it is today. Businesses of all kinds must manage their systems in the face of ever growing and changing complexities. Good Identity and Access Governance practices are front and center in the ongoing battle to deal with constant change effectively.
March 22, 2013
Resource
sites/default/files/resource-media/pdf/white_paper_managing_change_and_complexity_with_identity_and_access_gove._1.pdf
Protect
For provider organizations, tools that drive improved performance of legacy clinical applications as well as improve security and create efficiencies in the management of client computing are increasingly becoming critical for healthcare organizations. Desktop virtualization technology is increasingly being used by providers to realize these advantages.
March 13, 2013
Resource
sites/default/files/resource-media/pdf/netapp_hc_wp_desktop_virtualization_031213.pdf
Protect
Agility is central to delivering excellence in patient care. However, healthcare organizations have entered a new era of scale in which the amount of data captured, processed, and stored is breaking down every architectural construct in the storage industry. NetApp delivers innovative technologies and capabilities for an agile data infrastructure that address the challenges of big data scale, enabling healthcare providers to gain insight into massive datasets, move data quickly, and store important content for long periods of time.
March 13, 2013
Resource
sites/default/files/resource-media/pdf/netapp_hc_wp_patient_care_clinical_data_031213.pdf
Protect
This white paper focuses on how an EHR-Extender (EHR-e) can help hospitals leverage data trapped in the EHR and other clinical systems to establish better care team communication. The result of contextual critical alerts and texts are improved communication and enhanced workflows which makes patients, healthcare staff, administration, and regulators happy.
January 2, 2013
Resource
sites/default/files/resource-media/pdf/extension_wp_beyond_the_ehr_final.2012.12.11.pdf
Protect
Watch this informative video to learn more about EXTENSION's most popular clinical workflow solutions for nurses and physicians inluding nurse call integration, mobile critical lab notifications, mobile report availability, mobile STAT order notifications, HIPAA-compliant texting and more. EXTENSION's mobile point-of-care solutions improve staff satisfaction, patient safety, and HCAHPS scores.
January 2, 2013
Resource
Protect
http://www.medtechmedia.com/files/resource_central/HealthAlert_Overview_Video.mov
In March 2012, the Obama Administration launched a $200 million “Big Data Research and Development Initiative,” which aims to transform the use of big data for scientific discovery and biomedical research, among other areas. Stakeholders now need to come together to take advantage of market conditions and realize the value of the incredible amount of important data in a more efficient and expeditious manner. In the spirit of collaboration and as part of the Intel Innovations Summit, the global technology leader in computing convened four thought leaders to share how their respective industries are meeting challenges and utilizing big data.
November 15, 2012
Resource
sites/default/files/resource-media/pdf/intel_white_paper_1_big_data.pdf
Protect
A recent survey of IT executives found nearly 90% see business value in transitioning to Cloud computing, but only 20% have a plan to get there. Healthcare Cloud solutions require Compliance, Security, Privacy, Redundancy, and Scalability, so choosing the right path from on-premises servers to the Cloud can be daunting. Learn how to chart a quick and affordable course to healthcare <a href="/directory/cloud-computing" target="_blank" class="directory-item-link">Cloud Computing</a> and how to choose the right Cloud services partner.
November 7, 2012
Resource
sites/default/files/resource-media/pdf/qts_sizing_up_the_cloud_v2gen.pdf
Protect
In January 2010, QualSight - the nation’s largest LASIK manager serving over 75 million health plan members - was informed that a hack attempt had been made against their infrastructure. They were concerned that a repeat occurrence could take place and wanted to take a pro-active role in eliminating any future occurrence. Download this case study to find out how QualSight finally found a solution that offered complete HIPAA compliancy.
November 7, 2012
Resource
sites/default/files/resource-media/pdf/fh_cs_qualsight_wp.pdf
Protect
As I travel the country, I find that CIOs everywhere are struggling with BYOD in particular but remote access more generally.
November 30, 2012
Blog
Just two and a half years after hosting a workshop on the HIPAA Privacy Rule's de-identification standard, OCR has issued its "Guidance Regarding Methods for De-identification of Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule."
November 29, 2012
Blog
Google your name. The first results will likely be physician finder sites like RateMDs.com, Health Grades or Vitals, or broad-based service finders like Yelp or InsiderPages. The reviews can be critical to your success as a doctor in today’s world, regardless of whether they are true or not.
November 8, 2012
Blog
Although we all applaud the massive push towards electronic health records and the digitization of medical information, there are some very tangible cybercrime data breach threats that exist which could topple the momentum gained by the launch of the HITECH Act two and half years ago.
October 31, 2012
Blog
Since I keep track of this stuff, I need to include this BBC story on my blog. It involves a patient in a hospital ward taking a picture of another patient and posting it on Facebook along with an insult.
October 4, 2012
Blog
I’ve always been of the opinion that anything I disseminate via social media is pretty much fair game, and I try to play by the golden rule of “If you don’t want it used against you in a court of law, don’t tweet it, post it, link it, pin it, etc.”
July 9, 2012
Blog
At the weekly healthcare and social media tweet chat (#HITsm), hosted by HL7 Standards, participants discussed four previously posed questions, exploring the practical use of social media in the healthcare space. Here is a roundup of the best responses.
July 6, 2012
Blog
One major issue facing private and public Health Information Exchanges (HIE) is how to ensure patients privacy preferences are respected by obtaining their consent before data is shared.
June 20, 2012
Blog
America’s population is aging, insurance enrollment is growing, healthcare utilization is increasing, and the cost of delivering medical care is rising. As a result, many companies in the healthcare industry are being challenged to serve more patients and members, to improve the quality of care, and to reduce operational costs.
June 14, 2012
Blog
As we continue the journey to protect corporate data that is accessed from personal mobile devices, we're developing increasingly rigorous policies that rebalance individual preferences with corporate compliance requirements.
May 23, 2012
Blog
The Ponemon Institute recently released their Second Annual Benchmark Survey on Patient Privacy and Data Security. The study focused on actual data loss experience from a sample of 72 healthcare organizations. Co3 Systems created a Top 10 breach/data loss objectives list that helps organizations with the necessary steps in preparation of potential data breach.
May 17, 2012
Blog
There’s a fight going on about the adoption of health information technology in our country. This fight isn’t necessary and it shouldn’t be happening, but it is happening nonetheless – and patients have a lot at stake.
May 2, 2012
Blog