Q: I am employed by an acute care psychiatric hospital. The hospital's police department will sometimes take photographs of injuries patients have at the time of admission.
Cybersecurity threats, cloud computing, proliferation of mobile device technology, and the pervasiveness of social media directly affect healthcare operations and privacy and information security programs?as does the explosion of data, which makes safeguarding information assets increasingly more important and difficult.
To fully understand where your organization's risks lie, you not only need to have a firm grasp on risk analysis and assessment processes, you need to define these processes as well.
Q: My employer is trying to monitor its systems more closely. Which systems in particular are the most important with respect to monitoring? Which activities should the organization monitor?
When you think about a data breach, you probably think about things like maximum fines and penalties of $1.5 million, willful neglect, corrective action plans, and so forth, right? Well, think again.
Q: The hospital where I work entered into a business associate agreement (BAA) that requires the business associate (BA) to notify us of a potential breach no more than 60 days after it is discovered.
There's a new threat on the healthcare horizon. Medical identity theft is running rampant and hackers are targeting merchants' credit card systems. It's only a matter of time before the two worlds collide.