Health IT and Electronic Health Activate your FREE membership today |  Log-in

Community Blog:

PHI


December 16, 2015  1:44 PM

Protecting health IT data at rest



Posted by: adelvecchio
data encryption, Encryption, health data security, PHI

Dr  Mathews (2)

Bookmark and Share     Comments are off for this post.     RSS Feed     Email a friend

June 18, 2014  1:53 PM

When it comes to healthcare data, is more always better?



Posted by: adelvecchio
Data security, Data storage, Health care analytics, PHI

roberta-katz

Bookmark and Share     Comments are off for this post.     RSS Feed     Email a friend


January 15, 2014  2:57 PM

Trusted health IT solutions: Survey identifies gaps, opportunities



Posted by: adelvecchio
Data breach, Data loss, health IT, IT as a Service, PHI, Protected health information

roberta-katz

Bookmark and Share     Comments are off for this post.     RSS Feed     Email a friend


March 21, 2013  11:09 AM

HIPAA omnibus rule redefines role of business associates



Posted by: Jenny Laurello
Business associates, covered entities, HIPAA, HIPAA omnibus, PHI, Protected health information

Bookmark and Share     Comments are off for this post.     RSS Feed     Email a friend


December 17, 2012  5:17 PM

Don’t miss this webinar: Secure texting for care providers



Posted by: Jenny Laurello
HIPAA, Imprivata, PHI, texting, webcast

By Justyna Evlogiadis, Imprivata The fast-paced, communication-intensive environment of healthcare requires text messaging to facilitate communication among care team members. Over 80% of physicians in the US have smartphones, and hospital IT needs to provide simple,...


September 24, 2012  9:27 AM

Today’s enterprise fax software drives health care PHI security and clinical productivity



Posted by: adelvecchio
EHR, EMR, fax technology, HIPAA compliance, HITECH Act, PHI

Bookmark and Share     Comments are off for this post.     RSS Feed     Email a friend


June 11, 2012  11:41 AM

Data privacy and security: How do they stretch across the healthcare value chain?



Posted by: Jenny Laurello
Data management, data privacy and security, Data storage, HIPAA, PHI, PII, Privacy and security, Value chain

Bookmark and Share     Comments are off for this post.     RSS Feed     Email a friend


June 8, 2012  9:02 AM

The data access tug-of-war: Ensuring PHI security at Touchstone Behavioral Health



Posted by: Jenny Laurello
Behavioral Health, data privacy and security, Data security, HIPAA, PHI, Touchstone Behavioral Health

Bookmark and Share     Comments are off for this post.     RSS Feed     Email a friend


May 21, 2012  1:27 PM

BYOD and HIPAA compliance: A thorn in your side, or a time to thrive?



Posted by: Jenny Laurello
Bring your own device, BYOD, Data security, HIPAA, mHealth devices, mobile health, PHI

Guest post by: Edson Monteiro, President, Sentinel Digital...


March 23, 2012  6:00 AM

Debriefing the PHI Report: Determining the true cost of a data breach



Posted by: Jenny Laurello
ASNI, Data breach, HIPAA, PHI, PHI report, Protected health information, The Financial Impact of Breached Protected Health Information report

This week I had the chance to listen to a webinar highlighting the recently released report on The Financial Impact of Breached Protected Health Information. Released on March 5, the "PHI Report" has already been downloaded by more than 1,700...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: