Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
29
1
3
4
5
7
8
10
11
12
15
16
17
18
19
21
24
25
26
27
30
31
1
2
A Behavioral Health Collision At The EHR Intersection
2014-09-30    
2:00 pm - 3:30 pm
Date/Time Date(s) - 09/30/2014 2:00 pm Hear Why Many Organizations Are Changing EHRs In Order To Remain Competitive In The New Value-Based Health Care Environment [...]
Meaningful Use and The Rise of the Portals
2014-10-02    
12:00 pm - 12:45 pm
Meaningful Use and The Rise of the Portals: Best Practices in Patient Engagement Thu, Oct 2, 2014 10:30 PM - 11:15 PM IST Join Meaningful [...]
Adva Med 2014 The MedTech Conference
2014-10-06    
All Day
Adva Med 2014 The MedTech Conference October 6-8, 2014 McCormick Place Chicago, IL For more information, visit, advamed2014.com For Registration details, click here  
Public Health Measures Meaningful Use
2014-10-09    
12:00 pm - 12:45 pm
Public Health Measures Meaningful Use: Reporting on Public Health Measures Join Meaningful Use expert Jim Tate for a three part series of webinars addressing MU [...]
2014 Hospital & Healthcare I.T. Conference
2014-10-13    
All Day
Join us at our 2014 Hospital & Healthcare I.T. Conference and experience the following: Up to 125 Hospital & Healthcare I.T. executives from America’s most prestigious [...]
Connected Health Care 2014
Key Trends That will be Discussed at the Conference! Connected Healthcare 2014 is set to explore the crucial topics that are revolutionizing the connected health industry: [...]
HealthTech Conference
2014-10-14    
All Day
HealthTech Capital is a group of private investors dedicated to funding and mentoring new "HealthTech" start ups at the intersection of healthcare with the computer [...]
Health Informatics & Technology Conference (HITC-2014)
2014-10-20    
All Day
Information technology has ability to improve the quality, productivity and safety of health care mangement. However, relatively very few health care providers have adopted IT. [...]
HIMSS Amsterdam 2014
2014-10-20    
12:00 am
About HIMSS Amsterdam 2014 This year, the second annual HIMSS Amsterdam event will be taking place on 6-7 November 2014 at the Hotel Okura. The [...]
Patient Portal Functionality and EMR Integration Demonstration
2014-10-22    
2:00 pm - 3:30 pm
This purpose of this webcast is to present a demonstration to show how the Patient Portal integrates with EMR, as well as discuss how this [...]
Connected Health Symposium 2014
Symposium 2014 - Connected Health in Practice: Engaging Patients and Providers Outside of Traditional Care Settings Collaborating with industry visionaries, clinical experts, patient advocates and [...]
CHIME College of Healthcare Information Management Executives
2014-10-28 - 2014-10-31    
All Day
The Premier Event for Healthcare CIOs Hotel Accomodations JW Marriott San Antonio Hill Country 23808 Resort Parkway San Antonio, Texas 78761 Telephone: 210-276-2500 Guest Fax: [...]
The Myth of the Paperless EMR
2014-10-29    
2:00 pm - 3:00 pm
Is Paper Eluding Your Current Technologies; The Myth of the Paperless EMR Please join Intellect Resources as we present Is Paper Eluding Your Current Technologies; The Myth [...]
Events on 2014-09-30
Events on 2014-10-02
Events on 2014-10-06
Events on 2014-10-09
Events on 2014-10-13
Events on 2014-10-14
Connected Health Care 2014
14 Oct 14
San Diego
HealthTech Conference
14 Oct 14
San Mateo
Events on 2014-10-20
HIMSS Amsterdam 2014
20 Oct 14
Amsterdam
Events on 2014-10-23
Events on 2014-10-28
Events on 2014-10-29
Latest News Press Releases

Controlling and Protecting Copiers and Printers Necessary to Secure Healthcare Data

copiers printers

Controlling and Protecting Copiers and Printers Necessary to Secure Healthcare Data

The use of electronic health records has significantly improved the level of service patients receive today. At the same time, however, data breaches are also becoming common place. This isn’t surprising – today’s patient lifecycle has more touch points than ever before. Additionally, networked multi-function devices (MFD) such as copiers and printers are now mainstream in healthcare.

Each time a document or form is copied, scanned, printed, faxed or emailed— on either an analogue fax machine, digital MFD or mobile device—protected health information of patients can be accidentally exposed or intentionally compromised. Paper output can be particularly difficult to track and control and isn’t eliminated by electronic processes. A significant proportion of healthcare information breaches are routinely caused by privilege misuse or inadvertent errors.

Prevention is possible. Here are 6 ways healthcare organisations can secure their copiers and printers to protect the data of their patients:

1. Restrict access based on user authorisation

MFDs should support the restriction of features and capabilities of an authenticated user. They should also verify user credentials at the device, allow or deny access based on rules, restrict what each user can do at the devices, and meet regulatory requirements.

2. Centrally audit all network activity for print, copy, scan and network fax

Auditing allows MFDs to pass tracking information to a database. In the event of a data breach, this capability allows users to easily track down which device was the source of the breach; who the authenticated user was, as well as department and location; what was sent including file name, and file and document type; and where the data was sent, such as device, department, application and address. Auditing also enables users to analyse output and assign value for cost allocation, as well as implement rules-based printing.

3. Encrypt data to/from MFDs

Communications between smart MFDs and mobile terminals, servers and destinations should be encrypted to ensure documents are only visible to authorised users. This will ensure that data is encrypted while in transit between MFDs, devices, servers and third-party applications; and there’s end-to-end document security during the continuum of care.

4. Secure print release and authentication with follow-you print workflow

This will support the mobile workforce and lower the cost of printing by eliminating waste. It’s important to ensure compliance by keeping sensitive information secure.

5. Monitor and control information

Simultaneously monitoring and auditing sensitive information in documents ensures protection of health information is controlled before it gets to its intended destination. This requires capabilities such as proactive warning system of potential security breach, content filtering and redaction, and document interpretation prior to compromise.

6. Standardise and secure routing and destination workflows

The scanning of a file to a network folder is the most common, and, unfortunately, the type of workflow that’s most unsecure. It’s essential to standardise and integrate network scanning. Capabilities including optical character recognition (OCR) of all captured documents, and API-level integration with network fax servers, is necessary.

Today digital copiers have a large proportion of capabilities of computers. By controlling and protecting the physical and electronic access point on MFDs, damaging data breaches can be prevented.

About Kofax

Kofax enables organizations to Work Like Tomorrow™—today. Kofax’s Intelligent Automation software platform and solutions digitally transform document-intensive workflows. Customers realize greater agility and resiliency by combining our process orchestration, cognitive capture, RPA, output management, analytics and mobile capabilities to speed time-to-value and increase competitiveness, growth and profitability while mitigating compliance risk.