What can the recent hack on Sony Pictures teach us about the healthcare sector?
Actually, among the privileged Sony information bits that were compromised were not just nasty emails about Hollywood stars, but also employee healthcare data and other personal information.
So says Michael Bruemmer of Experian Data Breach Resolution, who believes the primary lesson to be learned is “that any organization that handles health information is vulnerable to hacking, regardless of whether it’s a healthcare provider, a business associate that processes the data, or an employer, such as Sony, that communicates about workers’ healthcare.”
Posted in Healthcare, Patient privacy, Security
The military has decided that it is indeed time to bring their health records into the modern electronic age. But military officials are yet to select the tech firm they will turn to for this massive project.
The Defense Department is currently accepting bids for an estimated 10 year project and the DoD is, understandably, attracting the likes of tech giants such as IBM and Hewlett-Packard.
The deadline for applications is October 31, and the project value is estimated at around $11 billion, according to The Washington Post.
Posted in mHealth news, Security, Technology
When it comes to the adoption of mHealth, the threat of patient data breaches continues to imperil the industry’s growth.
Citing data from a small survey that was conducted at the HIMSS14 conference last month, QRcodepress reports that “mHealth adoption could be facing some hurdles until it undergoes some improvements in the area of security.”
The risk of data breaches was the top major barrier identified to be in the way of mobile health technology adoption. After that was the ability to meet compliance and regulatory requirements for the security and privacy of patient information.
Posted in mHealth, mHealth news, Security
In the last round of bills to pass through Congress, we saw a slate of healthcare reform acts, as well as a stimulus package, which was designed to help jumpstart President Obama’s efforts to encourage for more affordable healthcare.
One of the provisions introduced in an aforementioned bill calls for new HIPAA regulations and advanced security protocols for patient information. These regulations significantly impact the ways that technology companies have been developing apps and software for hospitals and doctors’ offices.
Posted in mHealth, Patient privacy, Regulation, Security
Regrettably, a recent security breach by hackers has now been exposed as one of the biggest HIPAA security breaches in history.
New published reports indicate that hackers managed to infilitrate a server belonging to a Texas healthcare system. In the process, health information of more than 400,000 people was compromised.
The five-hospital St. Joseph Health System in Bryan, Texas, on Tuesday reported it had experienced a three-day long data security attack back in December, when certain parties gained unauthorized access to a server containing patient and employee Social Security numbers, dates of birth, addresses and medical information.
Posted in Healthcare IT, Security
In 2009, the HITECH Act was put into place to protect the privacy and security of patient information that is stored on portable electronic tools and devices. Last week in Concord, Massachusetts, Adult & Pediatric Dermatology, P.C. was the first to pay a settlement for a HITECH Act violations. They agreed to the amount of $150,000 that will be paid to the U.S. Department of Health & Human Services Office for Civil Rights.
The settlement is in response to a thumb drive that contained protected health information for 2,000 patients. The thumb drive was stolen out of one of the Dermatology employee’s cars.
Posted in Patient privacy, Regulation, Security
The desire to categorize and sort is a basic feature of our human brains. Some of us are better at it than others. Ken Kleinberg of The Advisory Board Company is especially adept at clear categorization of mobile health/mobility categories.
In Ken’s presentation at the mHealth Summit event in Washington D.C. last week, he presented a simple summary categorization of all things mobility in the healthcare world. I appreciated the structure and how it lends itself to discussing where mobility initiatives fit, and how a day in the life of a healthcare professional or a patient – can be touched by mobile services.
Ken says that what one may be doing with mobile healthcare can fit into one of five categories:
- Continue Reading
Posted in mHealth, Patient privacy, Security