Do you have safeguards for your patient records?

February 2009
Same-Day Surgery;Feb2009, Vol. 33 Issue 2, p12
Academic Journal
The article provides information on the security of patient data in the United States. It discusses the measures to ensure that patient data or health information are secured. Included in the measures offered by Stephen Trosty, president of Healthcare Risk Consultants, is the use of safeguards such passwords and tracking systems.


Related Articles

  • Joint Commission offers steps to better technology.  // Same-Day Surgery;Feb2009, Vol. 33 Issue 2, p12 

    The article reports that The Joint Commission has issued a Sentinel Event Alert on technology in line with the current security breaches on patient health information in the United States. It is stated that the Commission's Sentinel warns of intertwining of devices and networks which can be a...

  • Enforcement action taken over security breach.  // Same-Day Surgery;Feb2009, Vol. 33 Issue 2, p11 

    The article provides information on the security breaches on patient data in the United States. It discusses the enforcement action from the Department of Health and Human Services against Providence Health and Services over its theft or loss of health information of more than 386,000 patients....

  • Security breaches, Alert raise question: Are your patient data safe?  // Same-Day Surgery;Feb2009, Vol. 33 Issue 2, p9 

    The article provides information on security breaches on patient data in the United States. According to an international survey of outpatient surgery providers, 93 percent of mobile devices are at risk of exposures. It is implied that it is easy to steal electronic data because they are so...

  • EASY AS 1, 2, 3 … 4, 5, 6. DeOrio, Lee // For the Record (Great Valley Publishing Company, Inc.);1/17/2011, Vol. 23 Issue 1, p3 

    The article offers the author's insights on the importance of implementing strong password policies in health information technology (HIT).

  • A COMPETENCE BASED MSC IN HEALTH INFORMATICS FOR RWANDA. Verbeke, Frank; Wright, Graham; Nyssen, Marc // International Conference on eHealth;2016, p27 

    A MSc in Health Informatics program (MSc HI) has been running at the Regional e-Health Center of Excellence of Rwanda (REHCE) since 2011. A review of the program was ordered in February 2014, when 2 cohorts of students had completed the post-graduate certificate and diploma courses and most of...

  • LOCK IT OR LOSE IT. Meyer, Harris // H&HN: Hospitals & Health Networks;Sep2008, Vol. 82 Issue 9, p50 

    The article reports on the mandate of U.S. federal auditors about the need for hospitals to enforce rules on the security of health care information. Some executives and security consultants say hospitals have reason to worry about stepped-up scrutiny because so far hospitals have been lax in...

  • Cryptanalysis of the convex hull click human identification protocol. Asghar, Hassan; Li, Shujun; Pieprzyk, Josef; Wang, Huaxiong // International Journal of Information Security;Apr2013, Vol. 12 Issue 2, p83 

    Recently, a convex hull-based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then...

  • Reducing patient re-identification risk for laboratory results within research datasets. Atreya, Ravi V.; Smith, Joshua C.; McCoy, Allison B.; Malin, Bradley; Miller, Randolph A. // Journal of the American Medical Informatics Association;Jan2013, Vol. 20 Issue 1, p95 

    Objective To try to lower patient re-identification risks for biomedical research databases containing laboratory test results while also minimizing changes in clinical data interpretation. Materials and methods In our threat model, an attacker obtains 5-7 laboratory results from one patient and...

  • healthcare IT trends raise bar for information security. Glaser, John; Ake, Jennings // hfm (Healthcare Financial Management);Jul2010, Vol. 64 Issue 7, p40 

    The article offers information on some factors that healthcare providers must consider and prioritize relative to the protection and security of the hospitals' confidential information and records. It highlights laptop and electronic device encryption, internal content filtering and security...


Read the Article

Courtesy of

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics