Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
0Activity
0 of .
Results for:
No results containing your search query
P. 1
Health IT Data Security – An Overview of Privacy, Compliance, and Technology Options

Health IT Data Security – An Overview of Privacy, Compliance, and Technology Options

Ratings: (0)|Views: 4|Likes:
Published by John Trader
Radical advancements in health IT development and implementation have pushed the issue of health data security to the forefront of the collective healthcare provider mindset as they attempt to strike a balance between patient access to electronic health record protected health information (PHI) and data protection. The fact that so many health IT vendors now have access to and possess protected health information necessitated shift changes in the Health Insurance Portability and Accountability Act (HIPAA) of 1996 which was enacted to establish ground rules for the privacy protection of individually identifiable health information.

We invited Mac McMillan, Chair of the HIMSS Privacy and Security Task Force to discuss what these new changes are, define their parameters, the mission of the HIMSS PRivacy & Security Task Force, his definition of what “privacy” actually is, comments on new technology that are viable options for healthcare providers to implement as a way to protect access to sensitive patient data, and his thoughts on the increased adoption of PHI management applications such as Microsoft HealthVault.

Listen in to this podcast for more information on the latest health IT industry developments and regulations that govern PHI and for insight from Mac on why healthcare providers and third party vendors should pay close attention to compliance with recent HIPAA changes.
Radical advancements in health IT development and implementation have pushed the issue of health data security to the forefront of the collective healthcare provider mindset as they attempt to strike a balance between patient access to electronic health record protected health information (PHI) and data protection. The fact that so many health IT vendors now have access to and possess protected health information necessitated shift changes in the Health Insurance Portability and Accountability Act (HIPAA) of 1996 which was enacted to establish ground rules for the privacy protection of individually identifiable health information.

We invited Mac McMillan, Chair of the HIMSS Privacy and Security Task Force to discuss what these new changes are, define their parameters, the mission of the HIMSS PRivacy & Security Task Force, his definition of what “privacy” actually is, comments on new technology that are viable options for healthcare providers to implement as a way to protect access to sensitive patient data, and his thoughts on the increased adoption of PHI management applications such as Microsoft HealthVault.

Listen in to this podcast for more information on the latest health IT industry developments and regulations that govern PHI and for insight from Mac on why healthcare providers and third party vendors should pay close attention to compliance with recent HIPAA changes.

More info:

Categories:Types, Business/Law
Published by: John Trader on Oct 11, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/15/2014

pdf

text

original

 
M2SYS Healthcare Solutions
Free Online Learning Podcasts
Podcast length
 –
35:02
Topic: Healthcare IT Data Security
 –
HIPAA compliance,
HIMSS Privacy & Security Task Force Objectives, What is
“Privacy”, Technology Options to Protect Patient Data,
Adoption Trends for
 
Personal Health Information (PHI)
Applications
Mac McMillan, Chair, HIMSS Privacy & Security Policy Task Force
 
Topics Covered in Podcast:
HIMSS Privacy and Security Task Force Mission and ObjectivesDefinedHIPAA Rule Changes and How it Effects Provider
 –
BusinessAssociate Relationship
The Difference Between “Access” and “Possession” of PHI
Information & How it Impacts HIPAA Compliance
What Does “Privacy” Mean?
 
How Does “Fear” Factor into Policies Surrounding Privacy?
 
 
Topics Covered in Podcast (continued):
Viable Technologies to Protect Patient Data
Do Biometrics for Patient ID Violate a Patient’s Privacy?
 PHI Application Patient Adoption Trends

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->