protected health information (PHI)

See the following -

Open Source EHR Generator Delivers Healthcare Big Data with FHIR

Jennifer Bresnick | Health IT Analytics | September 8, 2017

Healthcare data analysts frustrated by the lack of access to large volumes of clean, trusted, and complete patient data can now take advantage of an open source EHR data generator platform called Synthea. One million synthetic patient records are currently available within the free online system, which uses HL7 FHIR to allow access to standardized datasets that mimic real electronic health records...

Read More »

Over 140,000,000 Americans’ Health Information Disclosed in Data Breaches

Rick Kam | ID Experts | August 10, 2015

Almost half of Americans’ sensitive health information have been disclosed in data breaches increasing their risk of medical identity theft and medical fraud. Read More »

Pilot Aims To Add Transparency To Exchange Of PHI

Greg Slabodkin | FierceHealthIT | July 11, 2013

A pilot program at the University of Texas at Austin is looking at how to enable patient tracking of who requests and receives their protected health information (PHI), according to a Health Data Management article. Read More »

PokitDok Achieves EHNAC Cloud-Enabled and Outsourced Services Accreditation for Health Information Exchange

Press Release | PokitDok | January 9, 2017

PokitDok, a software development platform for the business of healthcare, announced today it has achieved full accreditation with the Outsourced Services Accreditation Program (OSAP) for Health Information Exchange (HIE) and the Cloud-Enabled Accreditation Program (CEAP) from the Electronic Healthcare Network Accreditation Commission (EHNAC)...

Read More »

The Price of Wearable Craze: Personal Health Data Hacks

Maggie Overfelt | CNBC.com | December 12, 2015

...in a year when the world's largest technology, medical device and health-care firms are betting big and fast on wearable technology's role in delivering patients a more precise and cost-effective way to manage their health, experts are worried that the pace of updating data-privacy laws and building infrastructures with optimal levels of security doesn't match the speed of the market's technological rollout. The risks to consumers depend on what type of device they're wielding. In rare instances, weak links or endpoints in a cloud-based network powering something like a wearable insulin pump could be life threatening, as it opens the door to hackers tampering with them...

Read More »

The risks and rewards of IoT in healthcare

The Internet of Things (IoT) is taking the industries of the world by storm, and the healthcare sector is no exception. With 101 million IoT devices worldwide, the healthcare industry is becoming more connected by the day, and this figure is expected to increase by over 62% by 2020. As is always the case with new technology, the growing presence of IoT in the healthcare industry poses several threats to both patients and providers - but do the rewards outweigh the risks? Firstly, let's explore some of the key benefits that IOT can bring to healthcare:

Read More »

Thousands Of NFL Players' Medical Records Stolen From Skins Trainer

Barry Petchesky | Deadspin | June 1, 2016

In late April, the NFL recently informed its players, a Skins athletic trainer’s car was broken into. The thief took a backpack, and inside that backpack was a cache of electronic and paper medical records for thousands of players, including NFL Combine attendees from the last 13 years. That would encompass the vast majority of NFL players, and for them, it’s a worrying breach of privacy; for the NFL, it’s potentially a costly violation of medical privacy laws.Last month the league alerted the players’ union to the theft...

Read More »

Using Digital Ledger Technology To Put Physicians Back In Control

Our healthcare system is failing. It costs more and has overall worse outcomes than any other industrialized nation. It is failing because those on the front lines of healthcare - the physicians and patients- have no say in how the system is run. Distributed Ledger Technology (DLT) - otherwise known as blockchain - has the ability to change that. DLT allows for secure direct peer to peer (In healthcare this means patient to doctor and doctor to doctor) communication and data transfer. No more storage of private information and transactions on centralized data capturing systems like electronic health records platforms.

Read More »

Vampire Data And 3 Other Cyber Security Threats For 2013

Mike Miliard | Government Health IT | December 31, 2012

Kroll Advisory Solutions has released its 2013 Cyber Security Forecast, spotlighting some of the pressing and perhaps unexpected privacy and security issues healthcare and other organizations may be grappling with in the coming year. Read More »

Why Healthcare Data Security, Compliance Issues Go Untreated

Dave Brunswick | Health IT Security | August 9, 2016

Secure managed file transfer solutions can be beneficial to covered entities as they work to overcome healthcare data security and compliance issues. If there ever was a pulse of healthcare operations, it’s data. From patient enrollment forms, electronic health records, and health insurance information, the amount of electronic data flowing through the medical community increases every day. With that, healthcare data security must also be a top priority...

Read More »

Will “Digital Fingerprint” Forensics Thwart the Data Thieves Lurking in Hospital EHR Corridors?

As Halloween approaches, the usual spate of horror movies will intrigue audiences across the US, replete with slashers named Jason or Freddie running amuck in the corridors of all too easily accessible hospitals. They grab a hospital gown and the zombies fit right in.  While this is just a movie you can turn off, the real horror of patient data theft can follow you...Unfortunately, this horror movie scenario is similar to how data thefts often occur at medical facilities. In 2015, the healthcare industry was one of the top three hardest hit industries with serious data breaches and major attacks, along with government and manufacturers. Packed with a wealth of exploitable information such as credit card data, email addresses, Social Security numbers, employment information and medical history records, much of which will remain valid for years, if not decades and fetch a high price on the black market.

Read More »