TITLE

Joint Commission offers steps to better technology

PUB. DATE
February 2009
SOURCE
Same-Day Surgery;Feb2009, Vol. 33 Issue 2, p12
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The article reports that The Joint Commission has issued a Sentinel Event Alert on technology in line with the current security breaches on patient health information in the United States. It is stated that the Commission's Sentinel warns of intertwining of devices and networks which can be a threat to the security of medical records.
ACCESSION #
36262276

 

Related Articles

  • Enforcement action taken over security breach.  // Same-Day Surgery;Feb2009, Vol. 33 Issue 2, p11 

    The article provides information on the security breaches on patient data in the United States. It discusses the enforcement action from the Department of Health and Human Services against Providence Health and Services over its theft or loss of health information of more than 386,000 patients....

  • Do you have safeguards for your patient records?  // Same-Day Surgery;Feb2009, Vol. 33 Issue 2, p12 

    The article provides information on the security of patient data in the United States. It discusses the measures to ensure that patient data or health information are secured. Included in the measures offered by Stephen Trosty, president of Healthcare Risk Consultants, is the use of safeguards...

  • Security breaches, Alert raise question: Are your patient data safe?  // Same-Day Surgery;Feb2009, Vol. 33 Issue 2, p9 

    The article provides information on security breaches on patient data in the United States. According to an international survey of outpatient surgery providers, 93 percent of mobile devices are at risk of exposures. It is implied that it is easy to steal electronic data because they are so...

  • healthcare IT trends raise bar for information security. Glaser, John; Ake, Jennings // hfm (Healthcare Financial Management);Jul2010, Vol. 64 Issue 7, p40 

    The article offers information on some factors that healthcare providers must consider and prioritize relative to the protection and security of the hospitals' confidential information and records. It highlights laptop and electronic device encryption, internal content filtering and security...

  • A COMPETENCE BASED MSC IN HEALTH INFORMATICS FOR RWANDA. Verbeke, Frank; Wright, Graham; Nyssen, Marc // International Conference on eHealth;2016, p27 

    A MSc in Health Informatics program (MSc HI) has been running at the Regional e-Health Center of Excellence of Rwanda (REHCE) since 2011. A review of the program was ordered in February 2014, when 2 cohorts of students had completed the post-graduate certificate and diploma courses and most of...

  • LOCK IT OR LOSE IT. Meyer, Harris // H&HN: Hospitals & Health Networks;Sep2008, Vol. 82 Issue 9, p50 

    The article reports on the mandate of U.S. federal auditors about the need for hospitals to enforce rules on the security of health care information. Some executives and security consultants say hospitals have reason to worry about stepped-up scrutiny because so far hospitals have been lax in...

  • Reducing patient re-identification risk for laboratory results within research datasets. Atreya, Ravi V.; Smith, Joshua C.; McCoy, Allison B.; Malin, Bradley; Miller, Randolph A. // Journal of the American Medical Informatics Association;Jan2013, Vol. 20 Issue 1, p95 

    Objective To try to lower patient re-identification risks for biomedical research databases containing laboratory test results while also minimizing changes in clinical data interpretation. Materials and methods In our threat model, an attacker obtains 5-7 laboratory results from one patient and...

  • TEMPESTS SWIRL OVER I.T. DONATIONS AND ADOPTION. Gillespie, Greg // Health Data Management;Jul2007, Vol. 15 Issue 7, p6 

    The author addresses the issue of using electronic health records (EHR) in the U.S. He mentions the measures taken by the U.S. government to promote information technology adoption. He considers the possible impact of the relaxation of information technology donation regulations on the use of...

  • BIOMETRICS IN HEALTH CARE SECURITY SYSTEM, IRIS-FACE FUSION SYSTEM. Al-Hijaili, Shoa'a JadAllah; AbdulAziz, Manal // International Journal of Academic Research;Jan2011, Vol. 3 Issue 1, p11 

    Background objectives: Security is considered a corner stone for health-care information systems as they contain extremely sensitive information. The aim is to provide healthcare personnel access to the right information at the right time while ensuring high patient privacy. Biometrics play an...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics