Essential Guide

Get started Bring yourself up to speed with our introductory content.

HIPAA compliance, patient data security top provider concerns

Introduction

Healthcare providers had enough security concerns to tackle before the proliferation of mobile devices and patients' increased demand for their data complicated things. HIPAA compliance and patient data security are still key concerns of providers who now must ensure they are meeting those requirements while expanding their security coverage to protect their employees' use of mobile devices and other services, such as remote printing.

This guide goes into detail and gives examples of how providers have successfully updated their legacy software to stay ahead of today's security threats. How to avoid patient data theft and breaches is also covered in the sections below. Read on to discover how providers are creating more secure environments without restricting access to data and services.

1How to guard secure data-

Patient data security

From lost laptops to patient data hackers, providers have a number of threats from which they must shield their patient data. They must also strike a balance between accommodating the desires of physicians and patients who would like to have mobile access to data. HIPAA compliance and data security must also be considered when upgrading and maintaining EHRs and other health systems.

Tip

Assess legacy software to protect data

Hospitals can't replace all of their software, so they have to get creative when protecting their systems from new vulnerabilities. Continue Reading

Tip

Evaluate data security before purchasing an EHR system

Buying a new EHR system means new challenges for your IT department. Learn how they can secure remote access to patient records and more. Continue Reading

News

SIEM systems aid next generation of security

HIPAA compliance, mHealth access and data breaches are all concerns of providers. Find out how security information and event management (SIEM) software can combat those risks. Continue Reading

Podcast

Patient data security a hot topic at 2013 mHealth Summit

Find out what else patients need other than their data to better their overall care. Continue Reading

Tip

Go beyond current threats to patient data

Today's hackers steal patient info so they can turn around and sell it, but future threats to patient data may vary. Continue Reading

2BYOD and mHealth concerns-

Device security

Providers are adjusting their security policies to accommodate the bring your own device (BYOD) trend in healthcare. For many, this involves learning to protect devices and data without restricting employees' mobile capabilities. Find out how providers are navigating the complex task of meeting HIPAA regulations while allowing the use of a growing number of mobile devices.

Tip

BYOD saves time, presents security issues

Learn how practitioners can help protect patients when using mobile communication. Continue Reading

Tip

Facilities strengthen mobile policies to keep up with HIPAA

Increased HIPAA rules aren't stopping some providers from encouraging BYOD use among their staff. Continue Reading

News

SearchHealthIT survey takes pulse of mobile adoption

Read on to see how providers are accommodating the use of different mobile devices. Continue Reading

News

The future of Google Glass in healthcare

Google Glass may become a powerful tool in healthcare, but it is years away from realizing its potential. Continue Reading

Tip

Use of mobile devices has hospitals looking to cloud

Discover why hospitals are likely to use more cloud services in the near future. Continue Reading

3Omnibus complicates HIPAA-

HIPAA compliance

Staying HIPAA-compliant is a key marker for providers who want to maintain an organization-wide culture of security. Understanding the rules of HIPAA is the first step in compliance. There are a number of different ways to become educated, including through a gaming module developed by the Office of the National Coordinator for Health IT. Viewing and transmitting patient data aren't the only means by which HIPAA can be violated. Find out why providers need to beware of wireless network extenders and remote printing.

Tip

Tips for maintaining HIPAA compliance in the cloud

HIPAA is only one of the regulations providers must keep in mind when storing data in the cloud. Continue Reading

Tip

Training modules aim to educate practices

Could gaming help small providers understand the complexities of HIPAA compliance? Continue Reading

Tip

Secure texting a must in today's environment

Employees will text whether or not their messages are protected. Learn how a secure Short Message Service can meet HIPAA standards and protect providers. Continue Reading

Feature

Remote printing with HIPAA compliance in mind

Accommodating safe, HIPAA-compliant remote printing isn't easy, but some providers have found a way. Continue Reading

Tip

Femtocell adoption could lead to data breaches

Femtocells extend a hospital's wireless network, but not without creating additional security concerns. Continue Reading

Tip

Business associate agreements, risk analysis part of HIPAA compliance

Read this checklist to keep in line with the latest HIPAA requirements. Continue Reading

Tip

Updates needed to comply with HIPAA omnibus rule

Find out why planning for the unexpected is part of creating a culture of protected health information security. Continue Reading

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

SearchCompliance

SearchCIO

SearchCloudComputing

SearchMobileComputing

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchStorage

Close