The ruckus over a new cybersecurity bill's ban of a so-called Internet kill switch camouflages the real significance of the Cybersecurity and Internet Freedom Act. The bill, if enacted, would rejigger the way to govern federal IT security.
Though the E-Government Act assigns primary responsibility for IT security to agency CIOs, the Cybersecurity and Internet Freedom Act, introduced last week in the Senate, delineates responsibilities for CISOs.
The owner of four clinics in Maryland has been fined $4.3 million for HIPAA privacy rule violations that involved failing to provide 41 patients with access to their medical records and then failing to cooperate with federal investigators.
As he prepares to step down as National Coordinator for Health Information Technology, David Blumenthal, M.D., is calling for stepped-up efforts to protect the privacy of patient information.
Once a CEO understands the value and risks catered through mobile functionality, it is easier to discuss mobile innovations, policy and how the company can then strike a balance to meet customer and employee requirements.
Physicians adopting electronic health records systems need to demonstrate to their patients that they're taking adequate steps to keep records secure because so many consumers are worried about health information privacy.
A preliminary draft of new online authentication guidance from the Federal Financial Institutions Examination Council puts greater responsibility on the shoulders of financial institutions to enhance security.
The Department of Health and Human Services' Office for Civil Rights has yet to firm up a timeline or a strategy for HIPAA compliance audits, which were mandated by the HITECH Act.
Security professionals attending the HIMSS Conference list their key challenges, including developing truly practical privacy and security policies and procedures.
The latest Government Accountability Office report reflects the complexity of securing key IT systems: The administration has come far the past two years, but much more work remains to be done to secure effectively the nation's critical information infrastructure.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.