Health IT and Electronic Health Activate your FREE membership today |  Log-in

Data Security for HIPAA Compliance:


June 25, 2010  4:08 PM

Do you know your state breach notification laws?

Posted by: Azaltsman
HIPAA, HIPAA Security Rule, pci compliance, phi, robert hudock, state breach notification laws

Almost every state in the nation has some sort of data breach notification law intended for companies domiciled in each state. Each state has its own definition of what constitutes private information. For example, the

Bookmark and Share     Comments are off for this post.     RSS Feed     Email a friend

June 25, 2010  3:27 PM

Do your backup tapes hold PHI that is not encrypted?

Posted by: Azaltsman
aes, backup tapes, data breach, des, disaster recovery, disk to disk backup, encryption, HIPAA, pgp, phi, symantec

Most organizations today use tapes as target media for data backup software. Although disk to disk and offsite backup technology has been around for many years companies continue to use backup tapes as their means for data and disaster recovery. A backup tape is a highly portable medium has the...

May 17, 2010  10:03 PM

Best Practices for Securing Social Media in Healthcare – NIST Conference Part 4

Posted by: Azaltsman
audit, best practices, DLP, facebook, linkedin, phi, social media, standard of conduct, twitter

Social media touches many sectors and healthcare is one them! But how do you maintain compliance standards and ensure that social media is not only used appropriately, but by the right people? Sharon Finney from Adventist Health System in Winter Park, Florida prepared an excellent   Bookmark and Share     Comments are off for this post.     RSS Feed     Email a friend

May 17, 2010  9:00 AM

White House is serious about data and PHI security – NIST Conference Part 2

Posted by: Azaltsman
cyber security, deterrence, encryption, howard schmidt, phi, privacy, private partnerships, resilience, white house

Howard Schmidt, the newly-appointed White House cyber security coordinator, gave a fantastic...

May 14, 2010  10:16 AM

Risk Management Framework is Key to HIPAA Compliance – NIST HIPAA Conference Part 1

Posted by: Azaltsman
breach notification, HHS, HIPAA, HIPAA Security Rule, OCR, phi, Risk Management, RMF

Risk management was the centerpiece of discussions at the 2010 NIST HIPAA Security Conference. In her

Bookmark and Share     Comments are off for this post.     RSS Feed     Email a friend

May 3, 2010  1:23 PM

Meaningful Use to Require Doctors Provide Records to Patients within 96 hours

Posted by: Azaltsman
encryption, Meaningful use, patient records, phi

According to meaningful use [of EHR] guidelines patients must be provided with their health...

May 3, 2010  12:35 PM

U.S. leads in highest cost of data breach, study shows

Posted by: Azaltsman
breach notification, data breach, encryption, phi, ponemon study

A recent study suggests that the United States leads the world in the highest cost of data breaches. The study focused...

April 28, 2010  11:29 PM

Role of Security and Privacy in Meaningful Use

Posted by: Azaltsman
arra, certified ehr, data security, ehr, encryption, HIPAA, Meaningful use, phi

Providers seeking to prove meaningful use must take into consideration security and privacy of collected data. The term "meaningful use" is applicable to covered entities who chose to participate in the¬†   Bookmark and Share     Comments are off for this post.     RSS Feed     Email a friend

April 28, 2010  10:59 PM

Disk encryption is not the panacea for compliance

Posted by: Azaltsman
arra 13402, data at rest, data in motion, data in use, encryption, file encryption, full disk encryption, HIPAA, hitech act encryption, phi, whole disk encryption

We hear many news stories about stolen laptops and hard drives. The knee-jerk reaction is to purchase whole disk encryption products (there are many out there) to sleep better at night. There is no question that whole disk encryption should be a part of your data security arsenal. However, don't...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: