Category: Security

  • Standards Alone are not the Answer for Interoperability

    Standards Alone are not the Answer for Interoperability

    By John Halamka Today I have the honor of presenting a guest blog by David McCallie MD, SVP Medical Informatics, Cerner. He summarizes the collective feeling of the industry about the trajectory of interoperability. “I have been honored to have served on the HIT Standards Committee from its beginning in 2009. As I reach my…

  • Phase 2 HIPAA Audits Kick Off With Random Surveys

    Phase 2 HIPAA Audits Kick Off With Random Surveys

    by

    in

    Ideally, the only reason you would know about the following is due to scribes such as myself — but for the record, the HHS Office for Civil Rights has sent out a bunch of pre-audit screening surveys to covered entities. Once it gets responses, it will do a Phase 2 audit not only of covered entities…

  • Privacy Workgroup Prepares ‘Big Data’ Recommendations

    Privacy Workgroup Prepares ‘Big Data’ Recommendations

    by

    in

    The Privacy and Security Workgroup of the Health IT Policy Committee is preparing a set of recommendations about how the Office of the National Coordinator for Health IT should approach “big data” issues. The Privacy and Security Workgroup of the Health IT Policy Committee is preparing a set of recommendations about how the Office of…

  • Morning Headlines 6/8/15

    Morning Headlines 6/8/15

    by

    in

    CSC to pay $190 million to settle SEC charges CSC will pay a $190 million to settle fraud allegations after the SEC charged the company with manipulating financial results and hiding problems with its largest contract, the UK’s now defunct NPfIT program, from investors. CSC signed a $4.5 billion contract with the NHS to deploy…

  • Mayo Clinic CISO: Healthcare data most difficult to keep secure

    Mayo Clinic CISO: Healthcare data most difficult to keep secure

    by

    in

    Healthcare information is harder to protect than financial information, according to Mayo Clinic Chief Information Security Officer Jim Nelms, who previously spent 14 securing financial information years at The World Bank. read more …read more Source:: http://www.fiercehealthit.com/story/mayo-clinic-ciso-healthcare-data-most-diffuclt-keep-secure/2015-06-04?utm_medium=rss&utm_source=rss&utm_campaign=rss       

  • Are You a Healthcare IT Troublemaker or Rebel?

    Are You a Healthcare IT Troublemaker or Rebel?

    by

    in

    Troublemaker vs. Rebel http://t.co/aptrm2AE0S <– inspired by @LoisKelly @helenbevan @SeattleMamaDoc pic.twitter.com/37S8JqkpLR — Susannah Fox (@SusannahFox) May 25, 2015 What a great image and list! I’m going to be chewing on this one for a while. I think it’s a fine line between troublemaker and rebel. Although, at it’s core I’d suggest that the main difference…

  • So What is Interoperability Anyway?

    So What is Interoperability Anyway?

    by

    in

    By John Halamka One of my most memorable experiences as an IT leader was working with with a dissatisfied customer. I asked what requirements were unmet, what features were priorities, and what future state was desired. The answer was “I’m not sure, but I know I’m not getting what I need”. The use of the…

  • Breaking Bad And HIT:  Some Thoughts for Healthcare

    Breaking Bad And HIT: Some Thoughts for Healthcare

    by

    in

    Recently, I’ve been re-watching the blockbuster TV series hit “Breaking Bad” courtesy of Netflix. For those who haven’t seen it, the show traces the descent of a seemingly honest plain-Joe suburbanite from high school chemistry teacher to murderous king of a multi-state crystal meth business, all kicked off by his diagnosis of terminal lung cancer. As the…

  • Are We Chasing the Carrot or Afraid of the Stick?

    Are We Chasing the Carrot or Afraid of the Stick?

    The other day SGC asked in my hospital EHR adoption chart post: “If there were no penalties for non-EHR adoption, what would that chart look like?” For those that are too lazy to click over to that post to see the chart, it basically shows hospital EHR adoption being massively accelerated thanks to the government…

  • Data Breach Report: Healthcare Ranks Highest In Stolen Record Cost

    Data Breach Report: Healthcare Ranks Highest In Stolen Record Cost

    The average total cost of a data breach on an organization is $3.8 million, representing a 23 percent increase since 2013, according to a new report from Ponemon Institute, sponsored by IBM. The average total cost of a data breach on an organization is $3.8 million, representing a 23 percent increase since 2013, according to…