My fingers are crossed that the final version of the federal breach notification rule greatly clarifies when a breach has to be reported to the individuals affected as well as federal authorities.
The Massachusetts attorney general's office has objected to a hospital's decision not to send notifications to 800,000 individuals who may have been affected by a recent breach.
In an unusual breach incident, the Social Security numbers, gender and dates of birth for about 22,000 retired Delaware state employees were posted for five days on a state website.
The only state attorney general in the nation who so far has used his new power under the HITECH Act to sue a healthcare organization for HIPAA privacy and security rule violations is keeping a close eye on breaches of all sizes.
An audit has determined that 10 to 20 percent of the Department of Veterans Affairs' vendor contracts lack information security clauses, VA CIO Roger Baker says.
The Federal Aviation Administration is inadequately securing medical and personal information on the more than 3 million airmen who it certifies as being fit to operate an aircraft, according to a new report.
Businesses are faced with an assortment of security risks. Among the most prevalent risks are network attacks and infected computing systems (servers and end-user endpoints). The consequences of loss of use - that is, network failures and out-of commission computing systems - are just too great for any business to...
Faced with a batch of bad publicity about healthcare information security, the Department of Veterans Affairs has launched an effort to help polish its image.
A new federal healthcare task force on privacy and security, which will hold its first meetings June 10 and 11, will initially focus on policies and standards for the exchange of health information.
A California hospital will fire five employees and discipline another because they used social media to post personal discussions about hospital patients.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.