Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
26
27
28
29
30
31
1
2
4
5
6
7
8
10
11
12
12:00 AM - PFF Summit 2015
13
14
15
17
18
19
20
21
22
23
24
25
26
27
28
29
30
1
2
3
4
5
6
NextEdge Health Experience Summit
2015-11-03 - 2015-11-04    
All Day
With a remarkable array of speakers and panelists, the Next Edge: Health Experience Summit is shaping-up to be an event that attracts healthcare professionals who [...]
mHealthSummit 2015
2015-11-08 - 2015-11-11    
All Day
Anytime, Anywhere: Engaging Patients and ProvidersThe 7th annual mHealth Summit, which is now part of the HIMSS Connected Health Conference, puts new emphasis on innovation [...]
24th Annual Healthcare Conference
2015-11-09 - 2015-11-11    
All Day
The Credit Suisse Healthcare team is delighted to invite you to the 2015 Healthcare Conference that takes place November 9th-11th in Arizona. We have over [...]
PFF Summit 2015
2015-11-12 - 2015-11-14    
All Day
PFF Summit 2015 will be held at the JW Marriott in Washington, DC. Presented by Pulmonary Fibrosis Foundation Visit the www.pffsummit.org website often for all [...]
2nd International Conference on Gynecology & Obstetrics
2015-11-16 - 2015-11-18    
All Day
Welcome Message OMICS Group is esteemed to invite you to join the 2nd International conference on Gynecology and Obstetrics which will be held from November [...]
Events on 2015-11-03
NextEdge Health Experience Summit
3 Nov 15
Philadelphia
Events on 2015-11-08
mHealthSummit 2015
8 Nov 15
National Harbor
Events on 2015-11-09
Events on 2015-11-12
PFF Summit 2015
12 Nov 15
Washington, DC
Events on 2015-11-16
Articles

Jun 10 : Is Your Personal Health Information Secure?

ehr incentive audits

The article revealed that the Internet connection serving all Boston-area hospitals is attacked about every seven seconds, prompting Beth Israel Deaconess Medical Center to block about 98 percent of incoming emails, the hospital’s chief information officer, Dr. John Halamka, said.

“Most often, people do this in Eastern Europe and China because they want to use it as a spam relay.” Of much greater concern, Halamka said, is organized crime involving the theft and sale of electronic medical records to people who may use those records to pay for operations and treatment. Other thieves may use the data to falsify drug prescriptions or to steal a doctor’s license number. A single patient’s medical record is worth $50 on the black market, according to a panel of cyber security specialists at the Digital Health Conference held in 2011.

The Ponemon Institute released a survey on this topic in March 2014. That survey found that criminal attacks have surged in the past four years, from accounting for 27 percent of health care data breaches in 2011 to 40 percent this year.

Protecting Personal Health Information (PHI) has become exceedingly complex as health systems convert from paper records to electronic. There are literally hundreds of ways patient information can be compromised and the tools we are provided are generally inadequate to meet regulations as required by HIPAA. (HIPAA stands for the Health Insurance Portability and Accountability Act, a US law designed to provide privacy standards to protect patient’s healthcare information.)

Versio by ScribeRight (Versio) has been in the clinical documentation industry for over 14 years. As CEO, Lisa Pike, has said, “HIPAA is ridiculously strict and incredibly vague.” This strict/vague conundrum has some organizations over-compensating and others not being careful enough, albeit unwittingly. “At Versio, we take PHI security very seriously. Our mission is to ensure that every patient has an accurate health record and that organizations can count on us to keep those records secure,” said Ms. Pike

The Director of Technical Services for Versio, Thom Steinert, shared some thoughts regarding data security.

Q: What do you see as the biggest threat to data security in any organization?
TS: Unfortunately, people are the weak link in security. Much of the time lack of training and awareness is to blame, but even authorized users are subject to being careless.

Q: What are some simple steps to ensuring data security is top-of-mind in the organization?
TS: Develop an in-house awareness program. Broadcast security reminders regularly and plan training sessions to occur at scheduled intervals.

Source