Tips to overcome PHI security obstacles
Posted on 20 February 2013.
Healthcare organizationsí privacy programs are still understaffed and underfunded, even while millions of patientsí protected health information (PHI) are compromised.

Securing PHI in healthcare is an obstacle, with 94 percent of healthcare organizations suffering data breaches in the past two years, according to the Third Annual Benchmark Study on Patient Privacy & Data Security. Organizations face new challenges with the recent release of the HIPAA Final Omnibus Rule.

For those responsible for managing privacy and data security at healthcare organizations, industry experts offer six tips to overcome PHI security obstacles:

1. We don't do privacy because of HIPAA; we do it because it's part of quality patient care. Make sure we get value for our investment in privacy. - Jim Anderson, principal, Risk Masters.

2. Invest in your people. Train them on policies and procedures. Post and send security reminders. Reward compliance; sanction non-compliance. Make your people an asset, not a liability. - Mary Chaput, chief financial and compliance officer, Clearwater Compliance.

3. An essential risk management exercise for your privacy program is to protect PHI. Be sure you know where PHI is being collected, used, shared, and transferred and how and when PHI is securely destroyed. Map your data, classify it, and then securely dispose of it on schedule to lower the risks and costs of excess storage. - Ellen Giblin, privacy counsel, The Ashcroft Group.

4. Understand the value of the PHI in your organization in order to determine the appropriate level of investment to protect it. A core goal of the forum is to help participants calculate these values. - Rick Kam, president and co-founder of ID Experts.

5. With liability risks around PHI privacy escalating, business associates and subcontractors should consider purchasing cyber insurance to help mitigate the rising financial risk. - James C. Pyles, principal, Powers Pyles Sutter & Verville PC.

6. Develop a clear concept of how PHI protection will work. Recognize that a change in organizational culture may have to take place. Develop a written statement of benefits. Set reasonable goals. - Dick Wolfe, adjunct professor of health care administration, Washington Adventist University.





Spotlight

Almost 1 in 10 Android apps are now malware

Posted on 28 July 2014.  |  Cheetah Mobile Threat Research Labs analyzed trends in mobile viruses for Q1 and Q2 of 2014. Pulling 24.4 million sample files they found that 2.2 million files had viruses. This is a 153% increase from the number of infected files in 2013.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Jul 29th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //