Those using the federal list of major health information breaches to keep score of how many individuals have been affected must keep in mind that the list is revised as investigations continue.
Implementing electronic health records software that includes security components is just the first of many steps involved in ensuring security, says Bonnie Cassidy, president of the American Health Information Management Association.
Ron Kloewer, CIO at 25-bed Montgomery County Memorial Hospital, explains why the critical access facility's spending on information security will grow in 2011.
When a database breach occurs, consumer notification continues to be a public problem, and it's time for the federal government to step in, says Linda Foley, co-founder of the non-profit Identity Theft Resource Center.
The hospital that is treating Rep. Gabrielle Giffords, D-Ariz., and other victims of the Jan. 8 shooting incident in Tucson, Ariz., has fired three staff members for inappropriately accessing confidential medical records.
A New Hampshire radiology practice is notifying more than 230,000 patients that they may have been affected by a healthcare information breach incident involving hackers using a server to gain bandwidth to play a video game.
The federal list of major health information breaches has served as an eye-opener, making many healthcare organizations much more aware of their security risks.
Geisinger Health System has notified about 3,000 patients about a breach incident in which a physician inappropriately e-mailed unencrypted health information from his work computer to his home computer.
With more than 220 major health information breaches reported to federal authorities so far under the HITECH Act requirements, healthcare organizations are looking for effective strategies to prevent breaches and avoid headlines. One critical element to any breach prevention strategy is beefing up network...
Ron Kloewer, CIO at 25-bed Montgomery County Memorial Hospital, explains why the critical access facility's spending on information security will grow in 2011.
WikiLeaks founder Julian Assange has become akin to a "cyber messiah," Hemu Nigam says. And Assange's followers have proven: "If you turn your back on our messiah, we are going to take you down."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.