Privacy and Security

As more providers are using digital data, privacy and security issues have become a greater concern. Protecting confidential patient information is also a priority for IT vendors, who are interested in offering solutions that come equipped with heightened security features. The industry-wide transition to HIPAA 5010 code set comes with heightened emphasis on privacy of patient data content in provider transactions, since 5010 aims to ensure that only the "minimum necessary" personal health information required for business purposes is included in a transaction.

RELATED STORIES:
Privacy hindering EHR progress, say researchers
HHS proposes new privacy, security rules

 
While it's clear how Apple's HealthKit and the newest smartphones will play in the healthcare realm, Apple Pay, which the company is rumored to be preparing for a debut when it announces new iPads this week, could actually have an impact there as well.
October 15, 2014
News
An academic medical center in California is notifying patients of a HIPAA breach after officials discovered that a physician's email account had been hacked by an outside source.
October 14, 2014
News
National coordinator Karen DeSalvo, MD, revealed on Tuesday that ONC now has a new Chief Privacy Officer. "She brings a set of rich experiences at the intersection of health information, privacy, and modernizing the health care delivery system," DeSalvo wrote in an email to staff.
October 14, 2014
News
The U.S. government's new $450 million job training program targets 270 community colleges across the country, many of which plan to offer courses in health IT.
October 8, 2014
News
Add Facebook to the list of Silicon Valley technology companies looking for ways to make personal health data a new part of their growth strategy. Like Apple and Google, the social network is said to be developing wellness apps, as well as health discussion groups for its 1.3 billion users.
October 6, 2014
News
As Shellshock, the latest serious cybersecurity flaw, casts its shadow over healthcare, the U.S. Food and Drug Administration has finalized a set of recommendations to protect medical devices from Web-based attacks.
October 2, 2014
News
If you think you'll be able to dodge a data breach without putting in some serious work, think again. This year, healthcare organizations have reported more breaches than ever -- a 10 percent jump, on average. So what are they doing to improve these numbers? Not nearly enough, says the Ponemon Institute.
October 1, 2014
News
A mail merge gone wrong has officials at the University of Florida and Texas Health and Human Services rushing to send patient notification letters after the error, which occurred a year ago, resulted in a data breach.
September 29, 2014
News
The Health Information Trust Alliance has put out a word of warning about Shellshock, a system vulnerability it says could wreak much more damage than the infamous Heartbleed bug.
September 29, 2014
News
The HHS Office of the Inspector General found one "critical vulnerability" in the security of information on HealthCare.gov, according to a report it released Tuesday.
September 23, 2014
News
"Just by having an app on your device, (a cybercriminal) can determine your call history, take your contact list info, if they choose to." That's how vulnerable smartphones, tablets and their mobile ilk actually are, Jim Routh said, and it's not just the devices that chief information security officers like him have to worry about.
September 23, 2014
News
App developers, who say they are being left out of important mHealth privacy and security conversations, are calling on the federal government to give them a little more transparency around the issues.
September 18, 2014
News
Healthcare cybersecurity is rapidly coming into focus as a pressing need. Recent FBI reports and data breach events underscore what industry insiders already know - healthcare needs solutions for properly protecting information. Because healthcare must also deal with shrinking reimbursement and uncertain regulatory pressures, these solutions must be practical, effective, and facilitate patient care. To learn more about Cybersecurity in the healthcare space and its importance, please join Leidos Health for this free webinar.
May 14, 2014
Resource
Do Not Protect
http://himssmediawebinars.com/registration/webinar/healthcare-cybersecurity-3-practical-solutions?affiliatedata=website
Learn the challenges healthcare organizations have in locking down their HIPAA compliant applications in the cloud. See the latest data breaches and solutions to keeping your ePHI protected in the cloud.
March 25, 2014
Resource
sites/default/files/resource-media/pdf/firehost-locking-down-the-cloud-health-2014.pdf
Protect
Read through valuable insights on the changing landscape of the Healthcare IT industry today. Learn about leading practices from our thought leaders and their strategic thinking through a series of interviews by Deloitte’s key industry leaders, client interviews, research and thought leadership articles on government reform, new risk-based models such as value-based care, M&A activities, growing patient populations and increased competition amid shrinking resources that are driving transformation.
February 17, 2014
Resource
Protect
http://www.pageturnpro.com/MedTech-Media/56077-The-Innovator-Hospital-Poised-to-Deliver-Future-Care/index.html
Collaborative care offers tremendous benefit for patients, but demands PHI accessibility across the complex healthcare environment and across multiple users and locations. Information sharing without the worry of unauthorized access or a data breach is critical to ensure patient trust and avoid regulatory fines. In a business that’s constantly changing with new technologies, such as cloud and BYOD, and offering new ways of interacting with patients and providers, the need for secure access to patient data is critical. Download the latest RSA white paper, “Cybercrime and the Healthcare Industry,” to learn about the latest cyber threats targeting patient data and key areas of consideration in implementing security and access controls to address HIPAA, Meaningful Use, and other regulations.
February 14, 2014
Resource
sites/default/files/resource-media/pdf/cybhc_wp_0713.pdf
Protect
From online shopping and banking to accessing personal health information, consumers are moving more of their personal lives to the Web. The explosion of digital identities and loss of customer information from data breaches is driving the need for effective consumer-facing authentication and access management tools. Yet, many organizations lack adequate controls to secure access to their consumer Web portals out of fear of disrupting the user experience. The latest Forrester Research report, “Consumer Web Portals: Platforms at Significant Security Risk,” where you will gain insight on the risks and threats.
February 14, 2014
Resource
sites/default/files/resource-media/pdf/consumer_web_portals_-_platforms_at_significant_risk_december_2013.pdf
Protect
For enterprises looking at NGFWs, the most important consideration is: Will this new technology empower your security teams to securely enable applications to the benefit of the organization? It's not about blocking applications, but safely enabling these applications at the firewall.
January 31, 2014
Resource
sites/default/files/resource-media/pdf/10-things.pdf
Protect
Cybersecurity has become a leading topic both within and beyond the corporate boardroom. What enterprises need to stop the escalation of cyberattacks is a network security approach that is designed from the outset to enable the safe use of the applications and technologies required to support a thriving business.
January 31, 2014
Resource
sites/default/files/resource-media/pdf/cybersecurity-imperatives.pdf
Protect
This paper examines three different organizations, the legacy infrastructure they replaced, the Palo Alto Networks next generation security platform they deployed, and the substantial savings they realized - cutting both capital and operations costs by an average of 50%.
January 31, 2014
Resource
sites/default/files/resource-media/pdf/reducing-costs-with-nextgen-security.pdf
Protect
Iron Mountain has prepared this primer to help you navigate the changes in HIPAA, clarify the role of vendors and other third parties, and heighten your awareness of best practices that will aid in compliance and improve the management of both paper and electronic health records.
October 21, 2013
Resource
sites/default/files/resource-media/pdf/hipaa_primer-andthe-omnibus_final_rule_2013.pdf
Protect
Many healthcare organizations are recognizing the need for a more efficient and effective approach for addressing the HIPAA Security and Privacy rules, and other evolving compliance and security challenges. This paper explores one such solution: unified security monitoring. Unified security monitoring goes well beyond simplifying and automating HIPAA compliance. With always-on coverage and protection, it provides a mechanism for strengthening a healthcare organization’s overall security posture, while reducing ongoing operational risk.
October 9, 2013
Resource
sites/default/files/resource-media/pdf/tenable_for_healthcare_compliance_1.pdf
Protect
Are you prepared for the HITECH Omnibus Final Rule effective Sept 23, 2013? The final ruling has far reaching authority and penalties for noncompliance; unfortunately, most are unclear what the requirements mean for their organization and how to secure protected health information (PHI).
September 17, 2013
Resource
Do Not Protect
http://www.medtechwebinars.com/registration/webinar/addressing-final-hipaa-omnibus-rule-and-securing-protected-health-information?affiliatedata=website
Healthcare organizations are increasingly dependent on web-based technologies to improve patient engagement and address government incentive and regulatory requirements. The success of electronic healthcare record (EHR) initiatives depend on how effectively patients can obtain and manage their health related information securely online.
August 28, 2013
Resource
Do Not Protect
http://www.medtechwebinars.com/registration/webinar/securing-patient-portals-what-you-need-know-comply-hipaa-and-meaningful-use?affiliatedata=website
Google your name. The first results will likely be physician finder sites like RateMDs.com, Health Grades or Vitals, or broad-based service finders like Yelp or InsiderPages. The reviews can be critical to your success as a doctor in today’s world, regardless of whether they are true or not.
November 8, 2012
Blog
Although we all applaud the massive push towards electronic health records and the digitization of medical information, there are some very tangible cybercrime data breach threats that exist which could topple the momentum gained by the launch of the HITECH Act two and half years ago.
October 31, 2012
Blog
Since I keep track of this stuff, I need to include this BBC story on my blog. It involves a patient in a hospital ward taking a picture of another patient and posting it on Facebook along with an insult.
October 4, 2012
Blog
I’ve always been of the opinion that anything I disseminate via social media is pretty much fair game, and I try to play by the golden rule of “If you don’t want it used against you in a court of law, don’t tweet it, post it, link it, pin it, etc.”
July 9, 2012
Blog
At the weekly healthcare and social media tweet chat (#HITsm), hosted by HL7 Standards, participants discussed four previously posed questions, exploring the practical use of social media in the healthcare space. Here is a roundup of the best responses.
July 6, 2012
Blog
One major issue facing private and public Health Information Exchanges (HIE) is how to ensure patients privacy preferences are respected by obtaining their consent before data is shared.
June 20, 2012
Blog
America’s population is aging, insurance enrollment is growing, healthcare utilization is increasing, and the cost of delivering medical care is rising. As a result, many companies in the healthcare industry are being challenged to serve more patients and members, to improve the quality of care, and to reduce operational costs.
June 14, 2012
Blog
As we continue the journey to protect corporate data that is accessed from personal mobile devices, we're developing increasingly rigorous policies that rebalance individual preferences with corporate compliance requirements.
May 23, 2012
Blog
The Ponemon Institute recently released their Second Annual Benchmark Survey on Patient Privacy and Data Security. The study focused on actual data loss experience from a sample of 72 healthcare organizations. Co3 Systems created a Top 10 breach/data loss objectives list that helps organizations with the necessary steps in preparation of potential data breach.
May 17, 2012
Blog
There’s a fight going on about the adoption of health information technology in our country. This fight isn’t necessary and it shouldn’t be happening, but it is happening nonetheless – and patients have a lot at stake.
May 2, 2012
Blog
The Acting General Counsel of the National Labor Relations Board released a second report on outcome investigations involving social media that were submitted by regional offices and it underscores two main points.
May 2, 2012
Blog
Todd Park (@todd_park), United States chief technology officer for the Obama Administration, engaged in a live Twitter chat as part of Big Data Week, a string of community-led events relating to big data. Here is a Twitter recap of the Q&A.
April 25, 2012
Blog