Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
27
28
29
30
1
3
5
6
8
9
10
11
12
14
15
16
17
18
20
21
22
23
24
25
27
28
29
30
63rd ACOG ANNUAL MEETING - Annual Clinical and Scientific Meeting
2015-05-02 - 2015-05-06    
All Day
The 2015 Annual Meeting: Something for Every Ob-Gyn The New Year is a time for change! ACOG’s 2015 Annual Clinical and Scientific Meeting, May 2–6, [...]
Third Annual Medical Informatics World Conference 2015
2015-05-04 - 2015-05-05    
All Day
About the Conference Held each year in Boston, Medical Informatics World connects more than 400 healthcare, biomedical science, health informatics, and IT leaders to navigate [...]
Health IT Marketing &PR Conference
2015-05-07 - 2015-05-08    
All Day
The Health IT Marketing and PR Conference (HITMC) is organized by HealthcareScene.com and InfluentialNetworks.com. Healthcare Scene is a network of influential Healthcare IT blogs and health IT career [...]
Becker's Hospital Review 6th Annual Meeting
2015-05-07 - 2015-05-09    
All Day
This ​exclusive ​conference ​brings ​together ​hospital ​business ​and ​strategy ​leaders ​to ​discuss ​how ​to ​improve ​your ​hospital ​and ​its ​bottom ​line ​in ​these ​challenging ​but ​opportunity-filled ​times. The ​best ​minds ​in ​the ​hospital ​field ​will ​discuss ​opportunities ​for ​hospitals ​plus ​provide ​practical ​and ​immediately ​useful ​guidance ​on ​ACOs, ​physician-hospital ​integration, ​improving ​profitability ​and ​key ​specialties. Cancellation ​Policy: ​Written ​cancellation ​requests ​must ​be ​received ​within ​120 ​days ​of ​transaction ​or ​by ​March ​1, ​2015, ​whichever ​is ​first. ​ ​Refunds ​are ​subject ​to ​a ​$100 ​processing ​fee. ​Refunds ​will ​not ​be ​made ​after ​this ​date. Click Here to Register
Big Data & Analytics in Healthcare Summit
2015-05-13 - 2015-05-14    
All Day
Big Data & Analytics in Healthcare Summit "Improve Outcomes with Big Data" May 13–14 Philadelphia, 2015 Why Attend This Summit will bring together healthcare executives [...]
iHT2 Health IT Summit in Boston
2015-05-19 - 2015-05-20    
All Day
iHT2 [eye-h-tee-squared]: 1. an awe-inspiring summit featuring some of the world.s best and brightest. 2. great food for thought that will leave you begging for more. 3. [...]
2015 Convergence Summit
2015-05-26 - 2015-05-28    
All Day
The Convergence Summit is WLSA’s annual flagship event where healthcare, technology and wireless health communication leaders tackle key issues facing the connected health community. WLSA designs [...]
eHealth 2015: Making Connections
2015-05-31    
All Day
e-Health 2015: Making Connections Canada's ONLY National e-Health Conference and Tradeshow WE LOOK FORWARD TO SEEING YOU IN TORONTO! Hotel accommodation The e-Health 2015 Organizing [...]
Events on 2015-05-04
Events on 2015-05-07
Events on 2015-05-13
Events on 2015-05-19
Events on 2015-05-26
2015 Convergence Summit
26 May 15
San Diego
Events on 2015-05-31
Latest News

Jul 04 : NSTIC offers identity proofing for EHRs

nstic offers

The push to move the health care sector toward electronic  records includes a requirement that patients be able to access, download and share their health information on an ongoing basis to help coordinate and manage care. This is a condition of stage two of the “meaningful use” regime that delineates the access providers have to federal funding to underwrite the transition to electronic health records, and ultimately will factor into reimbursement by Medicare, Medicaid and other programs.

For providers, a big issue is how to give their patients secure access to records. Health records are arguably far more sensitive than financial information, because a financial breach can be repaired with new credit card numbers or bank information, and because consumers are ultimately made whole for lost funds. But once you’ve lost your health record, that’s it: your information is in the hands of a third party, and there’s no way to undo it. This becomes increasingly important as genomic information, mental health records, and other highly sensitive data becomes a regular part of an integrated online electronic health record.

This raises the issue of how patient access to health records should be governed. Issuing physical credentials can be expensive and unwieldy. But relying on conventional username-password access gives rise to problems as well.

“Passwords are a disaster,” said Jeremy Grant, senior executive advisor for identity management at the National Institute of Standards and Technology and the head of the National Strategy for Trusted Identities in Cyberspace (NSTIC). “With health care especially, we want to make sure you are who you say you are,” he said.

The solution for feds — embedded personal identity verification chips in identification badges — is not likely to work with the general population because of the considerable expense and inconvenience. “PIV is not the solution in the consumer space. If it was, we’d see everyone carrying one,” Grant said.

NSTIC funds pilot projects with an eye to seeding the market with solutions to the password problem. One such pilot program, funded with $2.6 million in NSTIC grants since 2012, is set to launch to users of the Inova health care system in Northern Virginia. By the end of July 2014, a group of Inova patients will have the option of reconfiguring their access to electronic health records using a combination of verified credentials.

The Cross Sector Digital Identity Initiative (CSDII) brings together data from name brand online services like Microsoft, Google, LinkedIn, Facebook and others, information from state motor vehicle departments, and commercial databases, and validates user identity using voice matching. For example, an Inova user can sign up with a Gmail account and driver’s license information. The Gmail account is confirmed with a ping to Google, and the driver’s license information is validated against patient information, and other third-party data. Once that is done, a patient is contacted by phone to confirm the account. Subsequent access to the health record is maintained on a two-factor authentication basis – a user signs in and then has to respond to a phone call to guarantee they have custody of the phone number on their account.

Source