Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
26
27
29
30
31
1
2
5
7
8
12
13
14
16
17
21
22
23
24
25
26
27
28
1
Proper Management of Medicare/Medicaid Overpayments to Limit Risk of False Claims
2015-01-28    
1:00 pm - 3:00 pm
January 28, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9AM AKST | 8AM HAST Topics Covered: Identify [...]
EhealthInitiative Annual Conference 2015
2015-02-03 - 2015-02-05    
All Day
About the Annual Conference Interoperability: Building Consensus Through the 2020 Roadmap eHealth Initiative’s 2015 Annual Conference & Member Meetings, February 3-5 in Washington, DC will [...]
Real or Imaginary -- Manipulation of digital medical records
2015-02-04    
1:00 pm - 3:00 pm
February 04, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Orlando Regional Conference
2015-02-06    
All Day
February 06, 2015 Lake Buena Vista, FL Topics Covered: Hot Topics in Compliance Compliance and Quality of Care Readying the Compliance Department for ICD-10 Compliance [...]
Patient Engagement Summit
2015-02-09 - 2015-02-10    
12:00 am
THE “BLOCKBUSTER DRUG OF THE 21ST CENTURY” Patient engagement is one of the hottest topics in healthcare today.  Many industry stakeholders consider patient engagement, as [...]
iHT2 Health IT Summit in Miami
2015-02-10 - 2015-02-11    
All Day
February 10-11, 2015 iHT2 [eye-h-tee-squared]: 1. an awe-inspiring summit featuring some of the world.s best and brightest. 2. great food for thought that will leave you begging [...]
Starting Urgent Care Business with Confidence
2015-02-11    
1:00 pm - 3:00 pm
February 11, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Managed Care Compliance Conference
2015-02-15 - 2015-02-18    
All Day
February 15, 2015 - February 18, 2015 Las Vegas, NV Prospectus Learn essential information for those involved with the management of compliance at health plans. [...]
Healthcare Systems Process Improvement Conference 2015
2015-02-18 - 2015-02-20    
All Day
BE A PART OF THE 2015 CONFERENCE! The Healthcare Systems Process Improvement Conference 2015 is your source for the latest in operational and quality improvement tools, methods [...]
A Practical Guide to Using Encryption for Reducing HIPAA Data Breach Risk
2015-02-18    
1:00 pm - 3:00 pm
February 18, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Compliance Strategies to Protect your Revenue in a Changing Regulatory Environment
2015-02-19    
1:00 pm - 3:30 pm
February 19, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Dallas Regional Conference
2015-02-20    
All Day
February 20, 2015 Grapevine, TX Topics Covered: An Update on Government Enforcement Actions from the OIG OIG and US Attorney’s Office ICD 10 HIPAA – [...]
Events on 2015-02-03
EhealthInitiative Annual Conference 2015
3 Feb 15
2500 Calvert Street
Events on 2015-02-06
Orlando Regional Conference
6 Feb 15
Lake Buena Vista
Events on 2015-02-09
Events on 2015-02-10
Events on 2015-02-11
Events on 2015-02-15
Events on 2015-02-20
Dallas Regional Conference
20 Feb 15
Grapevine
Latest News Press Releases

Controlling and Protecting Copiers and Printers Necessary to Secure Healthcare Data

copiers printers

Controlling and Protecting Copiers and Printers Necessary to Secure Healthcare Data

The use of electronic health records has significantly improved the level of service patients receive today. At the same time, however, data breaches are also becoming common place. This isn’t surprising – today’s patient lifecycle has more touch points than ever before. Additionally, networked multi-function devices (MFD) such as copiers and printers are now mainstream in healthcare.

Each time a document or form is copied, scanned, printed, faxed or emailed— on either an analogue fax machine, digital MFD or mobile device—protected health information of patients can be accidentally exposed or intentionally compromised. Paper output can be particularly difficult to track and control and isn’t eliminated by electronic processes. A significant proportion of healthcare information breaches are routinely caused by privilege misuse or inadvertent errors.

Prevention is possible. Here are 6 ways healthcare organisations can secure their copiers and printers to protect the data of their patients:

1. Restrict access based on user authorisation

MFDs should support the restriction of features and capabilities of an authenticated user. They should also verify user credentials at the device, allow or deny access based on rules, restrict what each user can do at the devices, and meet regulatory requirements.

2. Centrally audit all network activity for print, copy, scan and network fax

Auditing allows MFDs to pass tracking information to a database. In the event of a data breach, this capability allows users to easily track down which device was the source of the breach; who the authenticated user was, as well as department and location; what was sent including file name, and file and document type; and where the data was sent, such as device, department, application and address. Auditing also enables users to analyse output and assign value for cost allocation, as well as implement rules-based printing.

3. Encrypt data to/from MFDs

Communications between smart MFDs and mobile terminals, servers and destinations should be encrypted to ensure documents are only visible to authorised users. This will ensure that data is encrypted while in transit between MFDs, devices, servers and third-party applications; and there’s end-to-end document security during the continuum of care.

4. Secure print release and authentication with follow-you print workflow

This will support the mobile workforce and lower the cost of printing by eliminating waste. It’s important to ensure compliance by keeping sensitive information secure.

5. Monitor and control information

Simultaneously monitoring and auditing sensitive information in documents ensures protection of health information is controlled before it gets to its intended destination. This requires capabilities such as proactive warning system of potential security breach, content filtering and redaction, and document interpretation prior to compromise.

6. Standardise and secure routing and destination workflows

The scanning of a file to a network folder is the most common, and, unfortunately, the type of workflow that’s most unsecure. It’s essential to standardise and integrate network scanning. Capabilities including optical character recognition (OCR) of all captured documents, and API-level integration with network fax servers, is necessary.

Today digital copiers have a large proportion of capabilities of computers. By controlling and protecting the physical and electronic access point on MFDs, damaging data breaches can be prevented.

About Kofax

Kofax enables organizations to Work Like Tomorrow™—today. Kofax’s Intelligent Automation software platform and solutions digitally transform document-intensive workflows. Customers realize greater agility and resiliency by combining our process orchestration, cognitive capture, RPA, output management, analytics and mobile capabilities to speed time-to-value and increase competitiveness, growth and profitability while mitigating compliance risk.