Compliance & Legal
2015 thus far has been the year of hackers targeting the healthcare industry. And they don't appear to be slowing down. Just last week, another business associate notified individuals that their protected health information was stolen following yet another "sophisticated cyberattack."
Health system pharmacy managers and contracting & purchasing executives got a reprieve when the Food & Drug Administration moved the deadline for compliance with the Drug Supply Chain Security Act to Nov. 1, 2015.
If you've been looking for any set of official guidelines for mobile device security or best practices on keeping medical data safe, there's finally some serious movement on that front: a standards handbook with reams of valuable insight on the topic.
The process has been repeated time and again: Regulators issue proposed rulemaking, stakeholders comment, a final version manifests. So what, this time, has the industry concerned in the case of two pieces of meaningful use?
Does your hospital permit employees to use a file-sharing app to store patients' protected health information? Better think again.
Arguably just as important as ICD-10 readiness come time for October is also focusing on what's to happen afterward. And not all of what you hear is necessarily true. Much of it is myth.
As healthcare providers shift away from fee-for-service toward value-based payment models, they're hitting some serious roadblocks -- one of them being that the majority of them lack sophisticated IT tools and analysis to support these new models.
A controversial ban on administering abortion drugs via a telemedicine platform in Iowa has been overturned by the state's Supreme Court.
A former employee at a major New York health system has been indicted, along with seven others, for stealing personal data of 12,000 patients, enabling more than $50,000 in fraud.
The lion's share of medical identity theft victims can expect to pay upwards of $13,500 to resolve the crime. What's more, about 50 percent of consumers say they would find another healthcare provider if they were concerned about the security of their medical records.