FTC settlement agreements in two cases involving data exposed on peer-to-peer networks offer a reminder of the risks involved in using the networks. Social Security numbers, healthcare information and other personal details were exposed.
A risk analysis, as required under the HIPAA Security Rule, is a critical and foundational component of an effective risk management process that helps covered entities, and their business associates, to perform their mission and protect the health information entrusted to them.
The National Institute of Standards...
Health information exchange (HIE) - the electronic movement of health-related information among organizations according to nationally recognized standards - has the potential to transform nearly every aspect of healthcare delivery in this country. Recent policies have helped fund major growth in the world of...
Virtually every business acquires, uses and stores personally identifiable information (PII) about its customers, employees and partners. These organizations are expected to manage this private data appropriately and take every precaution to protect it from loss, unauthorized access or theft. Misusing, losing or...
Cloud computing has drawn a great deal of attention as a way to reduce IT costs in healthcare. But are the companies that offer cloud computing well-prepared to meet the HIPAA privacy and security requirements?
Join us for this exclusive session, where you'll gain an in-depth understanding of issues relevant to...
When will federal regulators draft long-awaited privacy and security rules for personal health records? So far, officials at the Department of Health and Human Services are being tight-lipped on the subject. Asked about the status of the rules, which, under the HITECH Act, were due in February, an HHS spokesman would...
A former patient care assistant at a Houston hospital was sentenced to 60 months in prison on February 3 after pleading guilty to bank fraud and stealing the identities of patients.
We all can see the technological and market forces converging to necessitate and enable electronic healthcare records.
But how does this transition impact privacy and compliance within an organization? What are the ramifications for IT and security departments?
Kim Singletary, Solutions Marketing for McAfee,...
We all can see the technological and market forces converging to necessitate and enable electronic healthcare records.
But how does this transition impact privacy and compliance within an organization? What are the ramifications for IT and security departments?
Kim Singletary, Solutions Marketing for McAfee,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.