Privacy and Security

As more providers are using digital data, privacy and security issues have become a greater concern. Protecting confidential patient information is also a priority for IT vendors, who are interested in offering solutions that come equipped with heightened security features. The industry-wide transition to HIPAA 5010 code set comes with heightened emphasis on privacy of patient data content in provider transactions, since 5010 aims to ensure that only the "minimum necessary" personal health information required for business purposes is included in a transaction.

RELATED STORIES:
Privacy hindering EHR progress, say researchers
HHS proposes new privacy, security rules

 
It seems that everybody under the sun has been asking "you're in the cloud, right?" But it's important to take a step back and realize that not all clouds are equal. Maybe it's time for people to be asking, "Are you doing the cloud right?"
May 30, 2014
News
Identity management and unauthorized data access by employees present the biggest threat to security and privacy of patient data, according to healthcare providers across the country.
May 30, 2014
News
Working on the patient portal portion of Stage 2 meaningful use? Officials at Mayo Clinic can offer some valuable insight into their own portal rollout -- challenges that have arisen, privacy concerns and how to do it right.
May 30, 2014
News
Working to spur more innovative approaches and complete understanding of pain management, six federal agencies have teamed to centralize data on pain research.
May 29, 2014
News
Information is money. And data brokers, companies that mine consumers' personal information and sell to the highest bidder, know this more than anyone. Their practices in collecting said data, however, have recently come under fire.
May 28, 2014
News
When it comes to privacy and security, healthcare IT leaders have their hands full. The Privacy & Security Forum, which will take place in San Diego, will help healthcare organizations address these challenges and mitigate risk throughout their organizations.
May 28, 2014
News
Returning service members are looking for jobs. Healthcare IT departments are desperate for qualified candidates. What special skill sets can veterans bring to the table?
May 26, 2014
News
There's a little bit of good news in the healthcare IT arena: CEOs and CIOs are quickly moving to make hiring chief information security officers a top priority.
May 20, 2014
News
A keystroke logger infecting three computers has been blamed for swiping the medical and financial data of UC Irvine Student Health Center patients.
May 19, 2014
News
Kaiser Permanente's Jim Doggett talks about the policies and practices that go into the planning of a secure environment.
May 14, 2014
News
A cyber threat response drill for healthcare organizations conducted this past month highlighted some serious challenges facing healthcare security professionals.
May 13, 2014
News
To those shirking their HIPAA privacy and security duties: get ready to pay up. That's the message the Department of Health and Human Services is sending after it set records Wednesday for imposing the largest HIPAA monetary fine to date on two entities found to be seriously lacking in the security arena.
May 8, 2014
News
Given the risks throughout today's complex threat and regulatory landscapes, your need to effectively and securely manage access to critical resources has never been greater. You need to know exactly who has access to what resources and if that access is appropriate. This is as true for the healthcare industry as it is for every other, highly regulated industry. As threats become more sophisticated, so does the speed with which your organization must respond to them.
March 22, 2013
Resource
sites/default/files/resource-media/pdf/white_paper_identity_and_access_governance_bringing_business_and_it_toge.pdf
Protect
The only thing that is constant is change. This old adage has never been truer for the healthcare industry than it is today. Businesses of all kinds must manage their systems in the face of ever growing and changing complexities. Good Identity and Access Governance practices are front and center in the ongoing battle to deal with constant change effectively.
March 22, 2013
Resource
sites/default/files/resource-media/pdf/white_paper_managing_change_and_complexity_with_identity_and_access_gove._1.pdf
Protect
For provider organizations, tools that drive improved performance of legacy clinical applications as well as improve security and create efficiencies in the management of client computing are increasingly becoming critical for healthcare organizations. Desktop virtualization technology is increasingly being used by providers to realize these advantages.
March 13, 2013
Resource
sites/default/files/resource-media/pdf/netapp_hc_wp_desktop_virtualization_031213.pdf
Protect
Agility is central to delivering excellence in patient care. However, healthcare organizations have entered a new era of scale in which the amount of data captured, processed, and stored is breaking down every architectural construct in the storage industry. NetApp delivers innovative technologies and capabilities for an agile data infrastructure that address the challenges of big data scale, enabling healthcare providers to gain insight into massive datasets, move data quickly, and store important content for long periods of time.
March 13, 2013
Resource
sites/default/files/resource-media/pdf/netapp_hc_wp_patient_care_clinical_data_031213.pdf
Protect
This white paper focuses on how an EHR-Extender (EHR-e) can help hospitals leverage data trapped in the EHR and other clinical systems to establish better care team communication. The result of contextual critical alerts and texts are improved communication and enhanced workflows which makes patients, healthcare staff, administration, and regulators happy.
January 2, 2013
Resource
sites/default/files/resource-media/pdf/extension_wp_beyond_the_ehr_final.2012.12.11.pdf
Protect
Watch this informative video to learn more about EXTENSION's most popular clinical workflow solutions for nurses and physicians inluding nurse call integration, mobile critical lab notifications, mobile report availability, mobile STAT order notifications, HIPAA-compliant texting and more. EXTENSION's mobile point-of-care solutions improve staff satisfaction, patient safety, and HCAHPS scores.
January 2, 2013
Resource
Protect
http://www.medtechmedia.com/files/resource_central/HealthAlert_Overview_Video.mov
In March 2012, the Obama Administration launched a $200 million “Big Data Research and Development Initiative,” which aims to transform the use of big data for scientific discovery and biomedical research, among other areas. Stakeholders now need to come together to take advantage of market conditions and realize the value of the incredible amount of important data in a more efficient and expeditious manner. In the spirit of collaboration and as part of the Intel Innovations Summit, the global technology leader in computing convened four thought leaders to share how their respective industries are meeting challenges and utilizing big data.
November 15, 2012
Resource
sites/default/files/resource-media/pdf/intel_white_paper_1_big_data.pdf
Protect
A recent survey of IT executives found nearly 90% see business value in transitioning to Cloud computing, but only 20% have a plan to get there. Healthcare Cloud solutions require Compliance, Security, Privacy, Redundancy, and Scalability, so choosing the right path from on-premises servers to the Cloud can be daunting. Learn how to chart a quick and affordable course to healthcare <a href="/directory/cloud-computing" target="_blank" class="directory-item-link">Cloud Computing</a> and how to choose the right Cloud services partner.
November 7, 2012
Resource
sites/default/files/resource-media/pdf/qts_sizing_up_the_cloud_v2gen.pdf
Protect
In January 2010, QualSight - the nation’s largest LASIK manager serving over 75 million health plan members - was informed that a hack attempt had been made against their infrastructure. They were concerned that a repeat occurrence could take place and wanted to take a pro-active role in eliminating any future occurrence. Download this case study to find out how QualSight finally found a solution that offered complete HIPAA compliancy.
November 7, 2012
Resource
sites/default/files/resource-media/pdf/fh_cs_qualsight_wp.pdf
Protect
Information Transforms Healthcare. As a Provider, you collect more data than ever before, from EMRs, patient surveys, home monitoring, to imaging. Collaborating on patient care is difficult at best—there’s so much data, it can’t easily be shared and it’s often incomplete. And new insights can only be derived from relevant information. IT executives can close the gap between maintenance and innovation budgets and deliver clinically relevant, operationally efficient, and fiscally sound solutions for the business. How? With a proven IT infrastructure that allows you to securely take advantage of newly digitized data.
November 7, 2012
Resource
sites/default/files/resource-media/pdf/emc_transformhealthcare.pdf
Protect
I’ve always been of the opinion that anything I disseminate via social media is pretty much fair game, and I try to play by the golden rule of “If you don’t want it used against you in a court of law, don’t tweet it, post it, link it, pin it, etc.”
July 9, 2012
Blog
At the weekly healthcare and social media tweet chat (#HITsm), hosted by HL7 Standards, participants discussed four previously posed questions, exploring the practical use of social media in the healthcare space. Here is a roundup of the best responses.
July 6, 2012
Blog
One major issue facing private and public Health Information Exchanges (HIE) is how to ensure patients privacy preferences are respected by obtaining their consent before data is shared.
June 20, 2012
Blog
America’s population is aging, insurance enrollment is growing, healthcare utilization is increasing, and the cost of delivering medical care is rising. As a result, many companies in the healthcare industry are being challenged to serve more patients and members, to improve the quality of care, and to reduce operational costs.
June 14, 2012
Blog
As we continue the journey to protect corporate data that is accessed from personal mobile devices, we're developing increasingly rigorous policies that rebalance individual preferences with corporate compliance requirements.
May 23, 2012
Blog
The Ponemon Institute recently released their Second Annual Benchmark Survey on Patient Privacy and Data Security. The study focused on actual data loss experience from a sample of 72 healthcare organizations. Co3 Systems created a Top 10 breach/data loss objectives list that helps organizations with the necessary steps in preparation of potential data breach.
May 17, 2012
Blog
There’s a fight going on about the adoption of health information technology in our country. This fight isn’t necessary and it shouldn’t be happening, but it is happening nonetheless – and patients have a lot at stake.
May 2, 2012
Blog
The Acting General Counsel of the National Labor Relations Board released a second report on outcome investigations involving social media that were submitted by regional offices and it underscores two main points.
May 2, 2012
Blog
Todd Park (@todd_park), United States chief technology officer for the Obama Administration, engaged in a live Twitter chat as part of Big Data Week, a string of community-led events relating to big data. Here is a Twitter recap of the Q&A.
April 25, 2012
Blog
As the nation begins its pilots of pioneer Accountable Care Organizations and shares more data for care coordination and population management, IT departments will be asked to make clinical records available to increasing numbers of loosely affiliated clinicians and staff.
April 24, 2012
Blog
Healthcare organizations have avoided the use of "public cloud" because of HIPAA/HITECH privacy concerns, lack of breach indemnification/data integrity guarantees, and the unwillingness of many cloud providers to sign business associate agreements.
April 13, 2012
Blog
I was able to talk with Gary Thompson co-founder and CEO of CLOUD Inc. - also known as the Consortium for Local Ownership and Use of Data, Inc.
April 10, 2012
Blog