HIPAA should trump other privacy laws

November 2007
Healthcare Risk Management;Nov2007 HIPAA Regulatory Alert, Vol. 29, p3
The article reports on the need for the U.S. Health Insurance Portability and Accountability Act of 1996 (HIPAA) to preempt state and local privacy laws to facilitate the use of information technology (IT) and ensure access by health care providers to needed information at the point of care.


Related Articles

  • Opt-in can help protect hospital from HIE risks.  // Healthcare Risk Management;Aug2012, Vol. 34 Issue 8, p93 

    The article cites James M. Kunick, chair of the Intellectual Property & Technology group at law firm Much Shelist, who explains that a hospital can protect itself from the risks of sharing a patient's data with a health information exchange (HIE) through the opt-in program for HIE participation.

  • iSonea launches smartphone app, AsthmaSense Cloud.  // Medical Device Daily;4/15/2013, Vol. 17 Issue 72, p4 

    The article offers information on AsthmaSense Cloud, a smartphone asthma management application developed by iSonea.

  • ID theft -- Should you spend more on security?  // Same-Day Surgery;Jul2011, Vol. 35 Issue 7, p73 

    The article reports on an annual survey which is conducted by the Healthcare Information and Management Systems Society and investigates medical identity theft at health care facilities.

  • ID theft -- Should you spend more on security?  // Same-Day Surgery;Aug2011 Supplement, p18 

    The article reports on the results of a survey on identity theft in health care facilities which was conducted by the Healthcare Information and Management Systems Society.

  • Monthly reports, audits improve security of cloud.  // Healthcare Risk Management;Apr2012, Vol. 34 Issue 4, p42 

    The article discusses patient information security as a major concern of healthcare providers while using cloud computing technology, and offers information on ways to improve security such as insisting on monthly written reports by webhost, audit rights and source code escrow arrangement.

  • The Enhancement of Security in Healthcare Information Systems. Liu, Chia-Hui; Chung, Yu-Fang; Chen, Tzer-Shyong; Wang, Sheng-De // Journal of Medical Systems;Jun2012, Vol. 36 Issue 3, p1673 

    With the progress and the development of information technology, the internal data in medical organizations have become computerized and are further established the medical information system. Moreover, the use of the Internet enhances the information communication as well as affects the...

  • HMM: HIPAA Modeling Method for Modeling Security in e-Health. Haqiq, Abdelhay; Bounabat, Bouchaib // International Journal of Computer & Electrical Engineering;Dec2013, Vol. 5 Issue 6, p591 

    Constructing secured health-care information systems requires collecting relevant information concerning the security safeguards and the ways to set them up. This information is the base for defining the targeted security system. In order to facilitate this knowledge gathering process, we...

  • Bulletin Board. ONC: Health Information Exchange Increasing, But Serious Roadblocks Remain.  // Journal of AHIMA;Jun2015, Vol. 86 Issue 6, p12 

    The article focuses on the views of the U.S. Office of the National Coordinator for Health IT's (ONC) head Karen DeSalvo regarding increase in the hospital health information exchange.

  • Meaningful connections: Linking the LIS to EMR systems. Fry, Mitchell // MLO: Medical Laboratory Observer;Dec2010, Vol. 42 Issue 12, p22 

    The article reports that laboratory information systems (LIS) of hospitals and physician practices are making the transition to electronic medical record (EMR) systems. It is estimated that by 2015, around 350,000 physicians will implement an EMR system within their practices.If a physician's...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics