Tag Archives: PHI Security
← Older posts Newer posts →Reported PHI Data Breaches Increased In 2013
December 11, 2013More than twice as many individuals have been affected by healthcare data breaches in 2013 than in 2012. And the main reason is a handful of mega-breaches this year, the current federal tally shows. But three recent large breaches that … Continue reading
Posted in PHI Data Security | Tagged Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, HHS, HIPAA Compliance, HIPAA Privacy and Security Rules, OCR, PHI, PHI Data Breaches, PHI Data Security, PHI Security | Leave a commentOIG Report Finds OCR Security Failures
December 9, 2013It’s an ironic story. The Office for Civil Rights, the division of HHS responsible for investigating HIPAA privacy and security violations, is now facing scrutiny after its own security practices failed to meet federal requirements. Not only did OCR fail … Continue reading
Posted in HIPAA Complicance | Tagged EHR, EHR Adoption, EHR Best Practices, EHR Consulting, EHR Implementation, Electronic Health Records, Electronic Medical Records, EMR, Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, HIPAA Compliance, HIPAA Privacy and Security Rules, OCR, OCR Audits, PHI, PHI Data Breaches, PHI Data Security, PHI Security | Leave a commentThe BYOD Movement In Healthcare
November 19, 2013“I recently had a security manager tell me the days he dreads the most are days after major holidays,” said Kenneth Kleinberg, managing director of The Advisory Board Company. IT managers are very familiar with the sentiment. The days when … Continue reading
Posted in Health IT | Tagged Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Services, Health IT Standards, HIPAA Compliance, HIPAA Privacy and Security Rules, PHI, PHI Data Security, PHI Security, telemedicine | Leave a commentPatient Portal Security Considerations
November 4, 2013As healthcare facilities launch their own patient portals, technology is only the first step. Administrators are learning that decisions need to be made on everything from patient login protocols to support for patient record revisions. HIPAA regulations, always a primary … Continue reading
Posted in Health IT Data Security | Tagged EHR, EHR Adoption, EHR Consulting, EHR Implementation, Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, HIPAA Compliance, HIPAA Privacy and Security Rules, PHI, PHI Data Security, PHI Security, Stage 2 Meaningful Use Rule | Leave a commentNIST To Review Data Encryption Processes Following NSA Allegations
November 1, 2013The National Institute of Standards and Technology—bedeviled by persistent allegations that its internationally recognized data encryption standards have been compromised by the National Security Agency—announced Friday it will undergo internal and independent formal reviews of its standards development processes for … Continue reading
Posted in Health IT Data Security | Tagged EHR, EHR Adoption, EHR Implementation, Electronic Health Records, Electronic Medical Records, EMR, Environmental Intelligence, Health IT Information Security, Health IT Policy, Health IT Services, HIPAA Compliance, HIPAA Privacy and Security Rules, PHI, PHI Data Security, PHI Security | Leave a commentFive Best Practices For Healthcare To Enhance Privacy And Data Security
September 10, 2013Healthcare institutions should emulate best-of-breed privacy polices developed by financial services firms rather than other hospitals, recommends William Tanenbaum, partner at New York-based technology law firm Kaye Scholer LLP. When it comes to privacy and data security, healthcare institutions face tremendous … Continue reading
Posted in HIPAA Complicance | Tagged Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, Health IT Tips, Healthcare, HIPAA Compliance, HIPAA Privacy and Security Rules, PHI, PHI Data Security, PHI Security | Leave a commentBYOD, Security Healthcare IT Executives Top Concerns
September 4, 2013The rising tide of smartphones and other mobile computing devices and their impact on healthcare information network security were the key concerns raised by healthcare IT executives in a focus group session and a subsequent report by HIMSS Analytics.The nine-page … Continue reading
Posted in Health IT | Tagged BYOD, Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Services, PHI, PHI Data Security, PHI Security | Leave a commentNo Encryption Results In Largest Reported PHI Data Breach
September 3, 2013One warm night in mid-July, more than 4 million patient records breezed out the door of the Advocate Medical Group administrative office in Park Ridge, Ill., in the arms of an unidentified thief who stole four computers from the largest … Continue reading
Posted in PHI Data Security | Tagged EHR, EHR Best Practices, EHR Consulting, EHR Implementation, Electronic Health Records, Electronic Medical Records, EMR, Encryption Solutions, Encryption Technology, Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, HIPAA Compliance, HIPAA Privacy and Security Rules, medical practice best practices, Patient Experience, PHI, PHI Data Breaches, PHI Data Security, PHI Security | Leave a commentEnvironmental Intelligence Releases August 2013 EI Connections Newsletter
August 30, 2013Environmental Intelligence LLC is pleased to release its August 2013 EI Connections Newsletter. Please send your feedback or suggestions to [email protected]. Click Here to view: August 2013 EI Connections Newsletter Want to automatically receive our monthly newsletter? Click on this link to … Continue reading
Posted in Environmental Intelligence | Tagged CMS, CMS EHR Incentives, CMS Policy, EHR, EHR Adoption, EHR Consulting, EHR Implementation, EHR Incentives, EI Connections Newsletter, Electronic Health Records, Electronic Medical Records, EMR, Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Policy, Health IT Services, HHS, HIPAA Compliance, Meaningful Use, ONC, PHI Data Security, PHI Security, Stage 2 Meaningful Use Rule | Leave a commentNIST Releases Voluntary Standards For IT Infrastructure Security
July 8, 2013The National Institute of Standards and Technology (NIST) is circulating a draft of voluntary standards it is developing for the critical infrastructure of IT security. The framework, when fully developed, will outline security functions and standards based on a risk-management … Continue reading
Posted in Healthcare Information Security | Tagged Environmental Intelligence, Health IT Best Practices, Health IT Information Security, Health IT Services, PHI, PHI Data Security, PHI Security | Leave a comment ← Older posts Newer posts →