The Office of the Inspector General will scrutinize the privacy and security policies of the Department of Health and Human Services, as well as the details of the HITECH Act electronic health record incentive program.
As 2010 draws to a close, federal regulators have a long list of unfinished business in drafting regulations and launching programs to protect patient privacy and bolster information security, as mandated under the HITECH Act.
Community hospitals must become more vigilant about information security, especially as they apply for federal electronic health records incentive payments, says Chuck Christian, CIO at Good Samaritan Hospital in Vincennes, Ind.
The Department of Veterans Affairs has taken steps to help ensure thumb drives lacking encryption cannot be plugged into its computers. The move comes following the discovery of an unencrypted drive containing personal information on veterans.
The new Congress likely won't cut EHR incentive funding, but it will keep a close eye on emerging HITECH Act privacy and security regulations, observers say.
Indiana Attorney General Greg Zoeller has sued health insurer WellPoint Inc., alleging the firm took too long to notify Indiana residents affected by a health information breach.
Two affiliated insurance plans serving Medicaid patients in Pennsylvania have reported the loss of an unencrypted portal flash drive with information on 280,000 members.
Looking for a checklist of common-sense steps federal regulators should take to ensure the privacy and security of patient information? Look no further.
Hospital association lawyer, Melissa Bianchi, testifying before a Senate panel seeks exemptions for healthcare providers from the bill's beach notification rules because they're already covered by HIPAA.
A Pennsylvania man has been indicted for alleged HIPAA privacy violations stemming from accessing patient information that was then used to file false tax returns.
Federal regulators received thousands of pages of comments from hundreds of organizations about proposed modifications to the HIPAA privacy, security and enforcement rules.
Organizations considering using the cloud computing model should carefully consider a long list of legal issues before taking the plunge, an attorney advises.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.