Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
29
30
31
1
2
3
4
5
6
7
8
9
11
12
13
16
17
18
19
21
23
24
25
26
27
29
30
31
1
The International Meeting for Simulation in Healthcare
2015-01-10 - 2015-01-14    
All Day
Registration is Open! Please join us on January 10-14, 2015 for our fifteenth annual IMSH at the Ernest N. Morial Convention Center in New Orleans, Louisiana. Over [...]
Finding Time for HIPAA Amid Deafening Administrative Noise
2015-01-14    
1:00 pm - 3:00 pm
January 14, 2015, Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Meaningful Use  Attestation, Audits and Appeals - A Legal Perspective
2015-01-15    
2:00 pm - 3:30 pm
Join Jim Tate, HITECH Answers  and attorney Matt R. Fisher for our first webinar event in the New Year.   Target audience for this webinar: [...]
iHT2 Health IT Summit
2015-01-20 - 2015-01-21    
All Day
iHT2 [eye-h-tee-squared]: 1. an awe-inspiring summit featuring some of the world.s best and brightest. 2. great food for thought that will leave you begging for more. 3. [...]
Chronic Care Management: How to Get Paid
2015-01-22    
1:00 pm - 2:00 pm
Under a new chronic care management program authorized by CMS and taking effect in 2015, you can bill for care that you are probably already [...]
Proper Management of Medicare/Medicaid Overpayments to Limit Risk of False Claims
2015-01-28    
1:00 pm - 3:00 pm
January 28, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9AM AKST | 8AM HAST Topics Covered: Identify [...]
Events on 2015-01-10
Events on 2015-01-20
iHT2 Health IT Summit
20 Jan 15
San Diego
Events on 2015-01-22
Latest News Press Releases

Controlling and Protecting Copiers and Printers Necessary to Secure Healthcare Data

copiers printers

Controlling and Protecting Copiers and Printers Necessary to Secure Healthcare Data

The use of electronic health records has significantly improved the level of service patients receive today. At the same time, however, data breaches are also becoming common place. This isn’t surprising – today’s patient lifecycle has more touch points than ever before. Additionally, networked multi-function devices (MFD) such as copiers and printers are now mainstream in healthcare.

Each time a document or form is copied, scanned, printed, faxed or emailed— on either an analogue fax machine, digital MFD or mobile device—protected health information of patients can be accidentally exposed or intentionally compromised. Paper output can be particularly difficult to track and control and isn’t eliminated by electronic processes. A significant proportion of healthcare information breaches are routinely caused by privilege misuse or inadvertent errors.

Prevention is possible. Here are 6 ways healthcare organisations can secure their copiers and printers to protect the data of their patients:

1. Restrict access based on user authorisation

MFDs should support the restriction of features and capabilities of an authenticated user. They should also verify user credentials at the device, allow or deny access based on rules, restrict what each user can do at the devices, and meet regulatory requirements.

2. Centrally audit all network activity for print, copy, scan and network fax

Auditing allows MFDs to pass tracking information to a database. In the event of a data breach, this capability allows users to easily track down which device was the source of the breach; who the authenticated user was, as well as department and location; what was sent including file name, and file and document type; and where the data was sent, such as device, department, application and address. Auditing also enables users to analyse output and assign value for cost allocation, as well as implement rules-based printing.

3. Encrypt data to/from MFDs

Communications between smart MFDs and mobile terminals, servers and destinations should be encrypted to ensure documents are only visible to authorised users. This will ensure that data is encrypted while in transit between MFDs, devices, servers and third-party applications; and there’s end-to-end document security during the continuum of care.

4. Secure print release and authentication with follow-you print workflow

This will support the mobile workforce and lower the cost of printing by eliminating waste. It’s important to ensure compliance by keeping sensitive information secure.

5. Monitor and control information

Simultaneously monitoring and auditing sensitive information in documents ensures protection of health information is controlled before it gets to its intended destination. This requires capabilities such as proactive warning system of potential security breach, content filtering and redaction, and document interpretation prior to compromise.

6. Standardise and secure routing and destination workflows

The scanning of a file to a network folder is the most common, and, unfortunately, the type of workflow that’s most unsecure. It’s essential to standardise and integrate network scanning. Capabilities including optical character recognition (OCR) of all captured documents, and API-level integration with network fax servers, is necessary.

Today digital copiers have a large proportion of capabilities of computers. By controlling and protecting the physical and electronic access point on MFDs, damaging data breaches can be prevented.

About Kofax

Kofax enables organizations to Work Like Tomorrow™—today. Kofax’s Intelligent Automation software platform and solutions digitally transform document-intensive workflows. Customers realize greater agility and resiliency by combining our process orchestration, cognitive capture, RPA, output management, analytics and mobile capabilities to speed time-to-value and increase competitiveness, growth and profitability while mitigating compliance risk.