Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
29
1
3
4
5
7
8
10
11
12
15
16
17
18
19
21
24
25
26
27
30
31
1
2
A Behavioral Health Collision At The EHR Intersection
2014-09-30    
2:00 pm - 3:30 pm
Date/Time Date(s) - 09/30/2014 2:00 pm Hear Why Many Organizations Are Changing EHRs In Order To Remain Competitive In The New Value-Based Health Care Environment [...]
Meaningful Use and The Rise of the Portals
2014-10-02    
12:00 pm - 12:45 pm
Meaningful Use and The Rise of the Portals: Best Practices in Patient Engagement Thu, Oct 2, 2014 10:30 PM - 11:15 PM IST Join Meaningful [...]
Adva Med 2014 The MedTech Conference
2014-10-06    
All Day
Adva Med 2014 The MedTech Conference October 6-8, 2014 McCormick Place Chicago, IL For more information, visit, advamed2014.com For Registration details, click here  
Public Health Measures Meaningful Use
2014-10-09    
12:00 pm - 12:45 pm
Public Health Measures Meaningful Use: Reporting on Public Health Measures Join Meaningful Use expert Jim Tate for a three part series of webinars addressing MU [...]
2014 Hospital & Healthcare I.T. Conference
2014-10-13    
All Day
Join us at our 2014 Hospital & Healthcare I.T. Conference and experience the following: Up to 125 Hospital & Healthcare I.T. executives from America’s most prestigious [...]
Connected Health Care 2014
Key Trends That will be Discussed at the Conference! Connected Healthcare 2014 is set to explore the crucial topics that are revolutionizing the connected health industry: [...]
HealthTech Conference
2014-10-14    
All Day
HealthTech Capital is a group of private investors dedicated to funding and mentoring new "HealthTech" start ups at the intersection of healthcare with the computer [...]
Health Informatics & Technology Conference (HITC-2014)
2014-10-20    
All Day
Information technology has ability to improve the quality, productivity and safety of health care mangement. However, relatively very few health care providers have adopted IT. [...]
HIMSS Amsterdam 2014
2014-10-20    
12:00 am
About HIMSS Amsterdam 2014 This year, the second annual HIMSS Amsterdam event will be taking place on 6-7 November 2014 at the Hotel Okura. The [...]
Patient Portal Functionality and EMR Integration Demonstration
2014-10-22    
2:00 pm - 3:30 pm
This purpose of this webcast is to present a demonstration to show how the Patient Portal integrates with EMR, as well as discuss how this [...]
Connected Health Symposium 2014
Symposium 2014 - Connected Health in Practice: Engaging Patients and Providers Outside of Traditional Care Settings Collaborating with industry visionaries, clinical experts, patient advocates and [...]
CHIME College of Healthcare Information Management Executives
2014-10-28 - 2014-10-31    
All Day
The Premier Event for Healthcare CIOs Hotel Accomodations JW Marriott San Antonio Hill Country 23808 Resort Parkway San Antonio, Texas 78761 Telephone: 210-276-2500 Guest Fax: [...]
The Myth of the Paperless EMR
2014-10-29    
2:00 pm - 3:00 pm
Is Paper Eluding Your Current Technologies; The Myth of the Paperless EMR Please join Intellect Resources as we present Is Paper Eluding Your Current Technologies; The Myth [...]
Events on 2014-09-30
Events on 2014-10-02
Events on 2014-10-06
Events on 2014-10-09
Events on 2014-10-13
Events on 2014-10-14
Connected Health Care 2014
14 Oct 14
San Diego
HealthTech Conference
14 Oct 14
San Mateo
Events on 2014-10-20
HIMSS Amsterdam 2014
20 Oct 14
Amsterdam
Events on 2014-10-23
Events on 2014-10-28
Events on 2014-10-29
Articles

Best Practices for Protecting Patient Data

cloud computing in healthcare

Best Practices for Protecting Patient Data

Data is vital to health care systems. It gives providers the information they need to care for patients. Because health care workers are entrusted with such sensitive and personal information, it is important to take steps to protect it. Records must be safeguarded as they are entered into computer systems, received from other providers and released to outside sources.

As a provider, you likely understand the challenges in keeping health information private. Here are a few steps to take that can help protect sensitive data.

Protect Records From Outside Threats

In health care systems, cybersecurity is vital. It helps keep patient information from being compromised by outside sources.

What is cybersecurity? Essentially, it is the act of defending data from outside attacks. Information breaches can take many forms, but some of the most common are:

  1. Phishing attacks: Criminals attempt to get sensitive information through communication that looks legitimate, such as emails designed to appear that they are from a company you trust.
  2. Malware: This is software designed to damage a computer or the data it contains.
  3. Ransomware: As the name suggests, a system is compromised and data is withheld until the victim pays the criminal for its release.

Computer intrusion can threaten any business, but it prevails in the healthcare industry. In addition to computer systems, medical devices such as ventilators, CT scanners, dialysis machines and infusion pumps can also be reached by attackers.

Cybersecurity can be improved in health care systems by creating a security culture among staff, using a firewall, keeping anti-virus software up to date, using strong passwords and changing them regularly and limiting data access to personnel on an as-needed basis.

Enforce and Maintain HIPAA Compliance

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides specific rules for the protection of medical information. Healthcare providers must comply with these rules. Providers and staff need to complete training and take refresher courses every two years.

Enforcing HIPAA compliance will help protect patient data. There are many options for HIPAA training and providers can choose what type of courses suit the needs of their organization.

Communicate With Health Care Partners

To the extent possible, health care providers can reach out to partners to understand their security policies. Helpful information may include who has access to patient data, when and where it will be sent and how it will be transmitted. Health care partners can be allies as you strive to protect patients’ sensitive information.

Use a Secure Email Service

Attackers can intercept your emails and read them without permission. In fact, email is one of the most common ways to breach data. It is one reason, for example, that banks and credit card companies do not send statements to their customers via email. Email systems that encrypt transmission will help secure communication between patients and providers. Health care providers can choose services that provide end-to-end encryption, which is HIPAA compliant. Once a secure email system is in place, staff may need to be trained in keeping email secure.
Emails sent behind a firewall do not need to be encrypted, but those sent beyond the firewall will need encryption.

Teach Staff to Keep Information Private

Outside of the computer system, data still has a chance to be compromised verbally or through printed documents. Staff can be educated on ways to protect patients’ privacy by:

  •  Holding sensitive conversations behind closed doors.
  • Removing information from printers, copiers and fax machines as soon as possible.
  •  Keeping patient information away from places unauthorized staff or patients may see it, such as counters or desktops.
  •  Storing personal information in a locked drawer or cabinet.
  •  Protecting computer monitors from being viewed by unauthorized people.
  •  Shredding documents that are no longer needed.

Protecting data that is shared verbally or on paper is as important as safeguarding cyber data.

Patients trust their health care providers to keep sensitive information protected. It requires vigilance, but taking measures to safeguard patient records keeps you in compliance and earns your patients’ trust.