Plaintext data compromises patient info
A hacker claims to steal nearly 10 million patient records using readily available plaintext data. How can you protect patient info?
A hacker claims to steal nearly 10 million patient records using readily available plaintext data. How can you protect patient info?
PrivaPlan President David Ginsberg leads June 28 webinar hosted by CORHIO about new HIPAA audits of covered entities and their business associates.
There are 10 technologies emerging in the next five years with the greatest vulnerabilities in terms of cybersecurity, finance, personal health and safety. Two directly impact the health care industry.
Putting off a HIPAA Business Associate Agreement puts sensitive health information at risk of being misused or improperly disclosed. That’s certainly not good, and neither is the steep financial penalty you could incur for overlooking this critical step.
We know we have an important job to do in healthcare IT, especially in keeping the greedy little hands of cyber attackers out of the personal files of patients and providers. A recently released report from Critical Infrastructure Technology backs this up.
This month the American Medical Association (AMA) released a list of the nine top issues they believe physicians should watch in the coming year and why, and what the AMA is doing to address the issues. We’re going to look at the two that call out health IT.
The proliferation of Electronic Health Records, patient health portals and the general increase in digital medical information has resulted in an increasing number of patients who bring their medical records to their providers of care, using some form of computer media like a USB drive.
The Office of Civil Rights has updated guidance on methods of de-identification of PHI that is available now.
At their 2012 Fall Conference, the Workgroup for Electronic Data Interchange (WEDI) awarded a distinguished service award to David Ginsberg our CEO of PrivaPlan for being a co-chair of the Privacy and Security strategic national implementation plan workgroup.
The proposed certification rule included particular technical requirements when dealing with patient requests to amend their electronic data. The final rule allows for more flexibility in this technical capability.
Don’t miss the latest updates, tips, and best practices in privacy and security compliance! Join our email newsletter for:
Sign up now and elevate your compliance game!