Blog Posts Tagged with "EMR"

959779642e6e758563e80b5d83150a9f

Six Must-Do Items to Protect Patient Privacy

October 03, 2012 Added by:Danny Lieberman

In order to prevent breaches of patient privacy, we first need to establish baseline business requirements for the organization. There are 6 business requirements for preventing patient privacy breaches, these are “must items” for any healthcare business unit manager...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Friends and Family Breach Patient Privacy, Not Estonian Hackers

September 17, 2012 Added by:Danny Lieberman

Humans being are naturally curious, sometimes vindictive and always worried when it comes to the health condition of friends and family. Being human, they will bend rules to get information and in the course of bending rules, breach patient privacy...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Network Exposure and Healthcare Privacy Breaches

August 20, 2012 Added by:Danny Lieberman

EHR interconnected with HIE systems have a big threat surface, because of big, very complex software systems with a large number of attacker entry points. Healthcare system vulnerabilities are compounded since everyone is using the same technology from Microsoft and following the same HIPAA compliance checklists...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Healthcare Information Exchanges: The Death of Patient Privacy

August 09, 2012 Added by:Danny Lieberman

Health information exchanges (HIE) enable the sharing of health records by physicians and other providers, enabling my family physician to see the results without getting up from her desk or without me shlepping paper or CD. Unfortunately, HIE are being modeled after the retail industry supply-chain model...

Comments  (0)

509ea0c1f4a210534eb004d35c10aa2d

Howard Schmidt to Unveil Report on Health Information Security

March 02, 2012 Added by:Marjorie Morgan

Schmidt is slated to announce the third publication in the Internet Security Alliance's financial cyber risk management series, "The Financial Impact of Breached Protected Health Information: A Business Case for enhanced PHI Security"...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Healthcare Data Interoperability Pain

January 18, 2012 Added by:Danny Lieberman

Imagine vendor-neutral, standard middleware for EHR applications that would expose data for patients and doctors using an encrypted Atom protocol – very simple, very easy to implement, easy to secure and with very clear privacy boundaries...

Comments  (0)

Fe3139b2aae983885565da7757da08a8

HIT Security: Conclusions in a Contradictory Report-Sandwich

December 02, 2011 Added by:Ed Moyle

The barometer that the Ponemon study uses (i.e. breach disclosures, breach impact) could actually be an indicator of better security instead of worse. It could be the case that breaches are on the rise because we're finding them more because not looking for them so violates federal law...

Comments  (0)

10e258c8d23d441b915c1b2333b6996a

Doctors and Patients Want EMR and Privacy Protection

February 14, 2011 Added by:Jack Anderson

One hopes and believes that with the Senate and the President protecting HITECH that we have at least until 2013 to implement what I feel is the most important program in healthcare today. If your goal is to improve patient care and reduce cost, nothing will have more impact than HITECH...

Comments  (3)