Because social media pose significant risks to patient privacy, healthcare organizations need to develop detailed social media policies. But unfortunately, many organizations have yet to take that action.
The Health Information Trust Alliance plans to enhance its Common Security Framework, a free regulatory compliance guide, by December 2012 to address privacy issues as well.
"Organized crime sees that this is a good business to come in, exploit and take advantage of the loopholes," says L.T. Lafferty, criminal defense attorney and mortgage fraud expert, on the schemes that cost banks billions each year.
A Georgia man has entered a guilty plea in a hacking case that involved freezing the computer operations of a pharmaceutical company earlier this year.
Federal CIO Steve VanRoekel says the freeze extension would "reinforce the importance of curtailing the proliferation of standalone .gov sites and infrastructure. Should agencies need to establish new web content during this timeframe, they should leverage existing .gov sites."
Healthcare organizations entering cloud computing contracts should carefully consider whether they need additional liability insurance coverage to address the risks involved, says IT consultant Gerard Nussbaum.
"Too often this focus on security has been used as an excuse to prevent the government from adopting the sort of innovative technologies that could better serve and engage the American people," Vivek Kundra says. "What's true is the inverse."
A hospital CIO calls for studies of how best to match patients to their records, citing the issue as critical to the success of health information exchanges.
Oregon state agencies are coming together to develop a centralized plan, ending a previously siloed approach, to simplify compliance with Internal Revenue Service rules to safeguard taxpayer data, says state CISO Theresa Masse.
"If left unaddressed," GAO says, "these issues will continue to increase FDIC's risk that its sensitive and financial information will be subject to unauthorized disclosure, modification or destruction."
NICE leader Ernest McDuffie says NIST is soliciting feedback from other citizens and organizations to improve the planning process for the comprehensive national education and awareness campaign.
Rep. Mary Bono Mack, at left in photo, wants security provider McAfee to brief the House subcommittee she chairs on its report of cyberattacks waged against governments and global businesses for more than five years it labels Shady RAT.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.