Audit raises concerns of data security requirements

August 2007
Healthcare Risk Management;Aug2007, Vol. 29 Issue 8, p3
The article reports on the audit performed by the U.S. Department of Health and Human Services (HHS) at Piedmont Hospital in Atlanta, Georgia that raised concerns of data security requirements in the information technology industry.


Related Articles

  • Auditors urge security for EHR networks.  // Hospital Access Management;Jun2013, Vol. 32 Issue 6, p70 

    The article discusses the government auditors have stressed upon the need for hospital network security due to breach of patient information using patient electronic health records (EHRs).

  • FALLING SHORT ON SECURITY AND PRIVACY. Cain, A. // Internal Auditor;Oct2012, Vol. 69 Issue 5, p15 

    The article discusses the PricewaterhouseCoopers report, "Fortifying Your Defenses: The Role of Internal Audit in Assuring Data Security and Privacy."

  • OIG Begins Auditing Certified EHR Security.  // Journal of AHIMA;Apr2014, Vol. 85 Issue 4, p12 

    The article informs that the Office of Inspector General (OIG) of the Department of Health and Human Services of the U.S. is planning to start auditing security capabilities of certified Electronic Health Record (EHR) system technology used in the EHR Incentive Program. Topics discussed include...

  • Protecting Patient Information: MUCH WORK REMAINS TO BE DONE ON THE DATA SECURITY FRONT. DEGASPARI, JOHN // Healthcare Informatics;Mar2011, Vol. 28 Issue 3, p32 

    The article emphasizes the need for U.S. hospitals to address data security to protect patient information in line with the implementation of electronic health records. It outlines the three things that health care providers must do to manage their data, including performing risk assessment and...

  • Give In! LANE, ADRIAN // Information Security;Oct2010, Vol. 12 Issue 8, p40 

    The article offers information on database auditing. It is defined as an examination of audit or transaction logs for the purpose of tracking changes with data or database structure. The four basic platforms used for creating, collecting and analyzing database audits, which include native...

  • Is Your Business a Data Breach Away from Disaster? SHILLING, CAMERON G. // Business NH Magazine;Mar2014, Vol. 31 Issue 3, p26 

    The article discusses the challenges associated with data security breaches such as cost of breaches, reduction of risk and cost savings through security compliance process in light of 2013 Data Breach Investigations Report that focuses on the disclosure of personal information of millions of...

  • On-Demand CPE Library.  // Compliance Week;Oct2015, Vol. 12 Issue 141, p78 

    The article presents the continuing professional education resources in high demand. Topics included are the security of data sharing and analytics, the steps in creating of a multiyear compliance training and communications plan, and the effective change in managing compliance regulations and...

  • Help for Internal Auditors on Good PCI Compliance. Aguilar, Melissa Klein // Compliance Week;Sep2009, Vol. 6 Issue 68, p13 

    The article presents a report from the Institute of Internal Auditors regarding companies' compliance with the Payment Card Industry Data Security Standard (PCI DSS). It states that only 56% of companies comply with PCI DSS. It offers several suggestions for more efficient compliance process...

  • DO YOUR DATA SECURITY POLICIES NEED A CHECKUP? Zillmer, Katy // Collector (0010082X);Jan2016, Vol. 81 Issue 6, p26 

    The article discusses data security breaches and its economic impact for credit and collection organizations while working with healthcare clients under the U.S. Health Information Technology for Economic and Clinical Health (HITECH) Act. It discusses the U.S. Health Insurance Portability and...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics