Keep Your Medical Info Private

September 2015
Consumer Reports on Health;Sep2015, Vol. 27 Issue 9, p6
The article discusses the increase in medical identify theft where personal data from health insurers, doctors' offices and hospitals can be used to steal money, products and services. Topics discussed include some strategies to secure one's medical information such as sharing personal data cautiously at the doctors' offices and hospitals, avoiding giving personal information by phone and checking statements and other communications from health insurers and health care providers.


Related Articles

  • Do Federal Regulations Help or Hinder Patient Data Security? Kass, Elliot M. // Health Data Management;Apr2015, Vol. 23 Issue 4, p5 

    The article discusses how federal regulations affect patient data security in the U.S. Topics covered include the effectiveness of electronic health record (EHR) meaningful use program in the country. Also mentioned is the problem concerning the use of EHR systems such as medical identity...

  • Tipping Point gets anti-phishing features. Roberts, Paul F. // eWeek;10/17/2005, Vol. 22 Issue 41, p33 

    This article reports that 3Com Corp. is adding new anti-phishing technology to its TippingPoint line of intrusion prevention systems. The new anti-phishing features are part of an update to the TippingPoint Digital Vaccine service. They combine system vulnerability data with pattern-matching to...

  • A new prescription for building trust online. Barnett, Jeff // Health Management Technology;Dec2010, Vol. 31 Issue 12, p1 

    The article suggests several measures on building trust online with a commitment to protecting the personal information of customers. Among the important safeguards that organizations should implement are strong authentication, an extended validation secure sockets layer (EV SSL) security...

  • How to safeguard your patients' information. Dowling, Robert A. // Urology Times;Nov2015, p18 

    The article discusses steps that a urology practice can take to protect patients information against security breaches. Topics include the role of physicians and staff as custodians of information, the need to review hiring practices and employee policy manual, and the imperative of conducting...

  • HIPAA Investigation Risks Are Increasing. CASCARDO, DEBRA // Podiatry Management;Sep2015, Vol. 34 Issue 7, p85 

    This section presents a reprint of the article "HIPAA Investigation Risks Are Increasing," by Debra Cascardo, which appeared in the September/October 2014 issue of "The Journal of Medical Practice Management." Topics discussed include the compliance of concerned businesses to the Health...

  • PHR Campaign Prepares for 2009 HIPS Week.  // AHIMA Advantage;Mar2009, Vol. 13 Issue 2, p11 

    The article focuses on the personal health record (PHR) Consumer Awareness Campaign to prepare for Health Information Privacy and Security (HIPS) week in the U.S. for 2009. It notes that the American Health Information Management Association (AHIMA) helps to deal with rising consumer...

  • STORAGE AND SECURITY OF PERSONAL HEALTH INFORMATION. Lemke, Jane // OOHNA Journal;Spring/Summer2013, Vol. 32 Issue 1, p25 

    No abstract available.

  • Medical identity theft: How to protect yourself.  // Journal of the American Dental Association (JADA);Mar2014, Vol. 145 Issue 3, p308 

    The article shares tips on how patients can protect themselves from medical identity theft. Several measures are recommended to safeguard personal documents and to have better knowledge of people being dealt with. Some things to check for a potential medical identify theft are identified such as...

  • A Novel Web-enabled Healthcare Solution on HealthVault System. Liao, Lingxia; Chen, Min; Rodrigues, Joel; Lai, Xiaorong; Vuong, Son // Journal of Medical Systems;Jun2012, Vol. 36 Issue 3, p1095 

    Complicated Electronic Medical Records (EMR) systems have created problems in systems regarding an easy implementation and interoperability for a Web-enabled Healthcare Solution, which is normally provided by an independent healthcare giver with limited IT knowledge and interests. An EMR system...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics