security
See the following -
OSEHRA, VA Reveal Open Source EHR Security Patching Benefits
The U.S. Department of Veterans Affairs (VA) and the open source IT community have paired up to prove the benefits of fixing technical security flaws within an open source system. Read More »
- Login to post comments
Patient-Centered Security Program (Part 2)
The previous part of this article laid down a basic premise that the purpose of security isto protect people, not computer systems or data. Let’s continue our exploration of internal threats. This is a policy issue that calls for involvement by a wide range of actors throughout society, of course. Policy-makers have apparently already decided that it is socially beneficial–or at least the most feasible course economically–for clinicians to share data with partners helping them with treatment, operations, or payment. There are even rules now requiring those partners to protect the data. Policy-makers have further decided that de-identified data sharing is beneficial to help researchers and even companies using it to sell more treatments.
- Login to post comments
Patient-Controlled Data: The Key to Interoperability?
Mr. Nagpal argues the issue here is one of who controls patient data — is it the patients themselves or care providers and vendors? He says if patients control their data — choose who gets access to it and see who's doing what with it — many of the proposed barriers to interoperability would dissolve. "Being able to access our own information from across our care team in a joined up manner, and then being able to determine who can access that information and for what uses, I think of these as fundamental rights," Mr. Nagpal says. "Given these rights, each one of us can grant any member of our care team, including our friends and family, researchers and any innovator with an interesting solution, with access to our data under our control"
- Login to post comments
Pentagon Approves Use Of Samsung Android And New BlackBerry Devices
The Defense Department has approved the Android Knox smartphone made by Samsung and new BlackBerry smartphones and tablets running Enterprise Service 10 software for use on its networks. Read More »
- Login to post comments
Pentagon: China Views Information Warfare As Key To Countering U.S. Pacific Forces
China views cyber warfare as the essential element to attack U.S. forces operating in the western Pacific, the Defense Department reported today in its annual analysis of that country’s military capabilities. Read More »
- Login to post comments
Pilots Move NSTIC From Theory To Practice
The National Institute of Standards and Technology awarded Sept. 20 five pilot projects worth more than $9 million in grant funding to demonstrate identity solutions under the National Strategy for Trusted Identities in Cyberspace, or NSTIC. Read More »
- Login to post comments
Possible Belarus Connection Prompts Probe Of Healthcare.gov
The U.S. Department of Health and Human Services launched a security probe of Healthcare.gov after a U.S. intelligence unit last week warned that portions of the Affordable Care Act website was built by software developers linked to the Belarus government. Read More »
- Login to post comments
Prepare to Be Hacked: Information Security for Small Organizations
Information security is challenging, and can be breathtakingly expensive in money and staff energy. Smaller organizations may not have the money or staffing expertise to do the job right, even when the need is the greatest. At OSCON 2016, Kelsey Gilmore-Innis of Sexual Health Innovations (SHI) gave a really interesting talk on how her small nonprofit has done some creative thinking about security, and how that influences the deployment and operation of their application. Callisto is an online reporting system designed to provide a more empowering, transparent, and confidential reporting system for college sexual assault survivors...
- Login to post comments
Preventing the Next Heartbleed and Making FOSS More Secure
David Wheeler is a long-time leader in advising and working with the U.S. government on issues related to open source software. His personal webpage is a frequently cited source on open standards, open source software, and computer security. David is leading a new project, the CII Best Practices Badging project, which is part of the Linux Foundation's Core Infrastructure Initiative (CII) for strengthening the security of open source software. In this interview he talks about what it means for both government and other users...
- Login to post comments
Programmers Volunteer To Help Fix Government’s Healthcare Website
If there’s one thing programmers hate, it’s a broken website paired with a terrible user experience. It runs contrary to everything geeks, nerds and their ilk believe in, and often, their first instinct is to probe into the code, see what’s wrong and propose a suggestion. Read More »
- Login to post comments
Promoting Transparency And Open Development In Land Governance
Since its inception, the International Land Coalition has been promoting transparency and accountability in land-related processes through a number of projects such as the Land Reporting Initiative, the CPL project, the Land Portal, the Land Observatory and the Land Matrix initiative. [...] Read More »
- Login to post comments
Prospects For Comprehensive Cyber Reform Are Questionable
Congress is unlikely to pass a comprehensive cybersecurity reform bill this year, largely because public concern about computer hacking doesn’t sway elections, a recently-departed House Homeland Security Committee senior aide said. Read More »
- Login to post comments
Pursuing Adoption of Free and Open Source Software in Governments
Free and open source software creates a natural — and even necessary — fit with government. I joined a panel this past weekend at the Free Software Foundation conference LibrePlanet on this topic and have covered it previously in a journal article and talk. Our panel focused on barriers to its adoption and steps that free software advocates could take to reach out to government agencies. Read More »
- Login to post comments
Q and A: What Feds Can Learn From Cities' Open Data Experiences
Cities hold the largest share of government data in the U.S., covering everything from liquor licenses to teacher performance reviews, but only a handful of cities have released that data to outside researchers and app developers. Read More »
- Login to post comments
Q&A: Why Was The VA Hacked?
In early June, a former Department of Veterans Affairs IT manager told members of the House Veterans Affairs Committee that the VA’s databases have been hacked by at least eight foreign organizations — notably by organizations linked with the Chinese military, which may have viewed (or taken) veterans’ personal identifying data, like Social Security numbers. Read More »
- Login to post comments