Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
29
30
1
2
3
4
5
7
8
10
11
12
13
14
15
16
17
18
20
22
23
24
25
26
27
28
29
30
31
1
C.D. Howe Institute Roundtable Luncheon
2014-04-28    
12:00 pm - 1:30 pm
Navigating the Healthcare System: The Patient’s Perspective Please join us for this Roundtable Luncheon at the C.D. Howe Institute with Richard Alvarez, Chief Executive Officer, [...]
DoD / VA EHR and HIT Summit
DSI announces the 6th iteration of our DoD/VA iEHR & HIE Summit, now titled “DoD/VA EHR & HIT Summit”. This slight change in title is to help [...]
Electronic Medical Records: A Conversation
2014-05-09    
1:00 pm - 3:30 pm
WID, the Holtz Center for Science & Technology Studies and the UW–Madison Office of University Relations are offering a free public dialogue exploring electronic medical records (EMRs), a rapidly disseminating technology [...]
The National Conference on Managing Electronic Records (MER) - 2014
2014-05-19    
All Day
" OUTSTANDING QUALITY – Every year, for over 10 years, 98% of the MER’s attendees said they would recommend the MER! RENOWNED SPEAKERS – delivering timely, accurate information as well as an abundance of practical ideas. 27 SESSIONS AND 11 TOPIC-FOCUSED THEMES – addressing your organization’s needs. FULL RANGE OF TOPICS – with sessions focusing on “getting started”, “how to”, and “cutting-edge”, to “thought leadership”. INCISIVE CASE STUDIES – from those responsible for significant implementations and integrations, learn how they overcame problems and achieved success. GREAT NETWORKING – by interacting with peer professionals, renowned authorities, and leading solution providers, you can fast-track solving your organization’s problems. 22 PREMIER EXHIBITORS – in productive 1:1 private meetings, learn how the MER 2014 exhibitors are able to address your organization’s problems. "
Chicago 2014 National Conference for Medical Office Professionals
2014-05-21    
12:00 am
3 Full Days of Training Focused on Optimizing Medical Office Staff Productivity, Profitability and Compliance at the Sheraton Chicago Hotel & Towers Featuring Keynote Presentation [...]
Events on 2014-04-28
Events on 2014-05-06
DoD / VA EHR and HIT Summit
6 May 14
Alexandria
Events on 2014-05-09
Latest News Press Releases

Controlling and Protecting Copiers and Printers Necessary to Secure Healthcare Data

copiers printers

Controlling and Protecting Copiers and Printers Necessary to Secure Healthcare Data

The use of electronic health records has significantly improved the level of service patients receive today. At the same time, however, data breaches are also becoming common place. This isn’t surprising – today’s patient lifecycle has more touch points than ever before. Additionally, networked multi-function devices (MFD) such as copiers and printers are now mainstream in healthcare.

Each time a document or form is copied, scanned, printed, faxed or emailed— on either an analogue fax machine, digital MFD or mobile device—protected health information of patients can be accidentally exposed or intentionally compromised. Paper output can be particularly difficult to track and control and isn’t eliminated by electronic processes. A significant proportion of healthcare information breaches are routinely caused by privilege misuse or inadvertent errors.

Prevention is possible. Here are 6 ways healthcare organisations can secure their copiers and printers to protect the data of their patients:

1. Restrict access based on user authorisation

MFDs should support the restriction of features and capabilities of an authenticated user. They should also verify user credentials at the device, allow or deny access based on rules, restrict what each user can do at the devices, and meet regulatory requirements.

2. Centrally audit all network activity for print, copy, scan and network fax

Auditing allows MFDs to pass tracking information to a database. In the event of a data breach, this capability allows users to easily track down which device was the source of the breach; who the authenticated user was, as well as department and location; what was sent including file name, and file and document type; and where the data was sent, such as device, department, application and address. Auditing also enables users to analyse output and assign value for cost allocation, as well as implement rules-based printing.

3. Encrypt data to/from MFDs

Communications between smart MFDs and mobile terminals, servers and destinations should be encrypted to ensure documents are only visible to authorised users. This will ensure that data is encrypted while in transit between MFDs, devices, servers and third-party applications; and there’s end-to-end document security during the continuum of care.

4. Secure print release and authentication with follow-you print workflow

This will support the mobile workforce and lower the cost of printing by eliminating waste. It’s important to ensure compliance by keeping sensitive information secure.

5. Monitor and control information

Simultaneously monitoring and auditing sensitive information in documents ensures protection of health information is controlled before it gets to its intended destination. This requires capabilities such as proactive warning system of potential security breach, content filtering and redaction, and document interpretation prior to compromise.

6. Standardise and secure routing and destination workflows

The scanning of a file to a network folder is the most common, and, unfortunately, the type of workflow that’s most unsecure. It’s essential to standardise and integrate network scanning. Capabilities including optical character recognition (OCR) of all captured documents, and API-level integration with network fax servers, is necessary.

Today digital copiers have a large proportion of capabilities of computers. By controlling and protecting the physical and electronic access point on MFDs, damaging data breaches can be prevented.

About Kofax

Kofax enables organizations to Work Like Tomorrow™—today. Kofax’s Intelligent Automation software platform and solutions digitally transform document-intensive workflows. Customers realize greater agility and resiliency by combining our process orchestration, cognitive capture, RPA, output management, analytics and mobile capabilities to speed time-to-value and increase competitiveness, growth and profitability while mitigating compliance risk.