Quarter of providers report breach in past year

December 2011
Same-Day Surgery;Dec2011, Vol. 35 Issue 12, p134
Academic Journal
The article reports on a 2011 survey from the Healthcare Information Management and Systems Society which found that approximately one quarter of U.S. health care facilities had experienced a data security breach in 2011.


Related Articles

  • Health Care's MOST WIRED 2011. WEINSTOCK, MATTHEW // H&HN: Hospitals & Health Networks;Jul2011, Vol. 85 Issue 7, p26 

    The article reports on the results of a 2011 survey which investigated U.S. hospitals' use of information technology. Information that the survey revealed about hospitals' use of information technology, including their ability to protect data, implement guidelines related to health care reform...

  • CYBERSECURITY: LOCKING THE VAULT. Plotkin, Jack // For the Record (Great Valley Publishing Company, Inc.);Dec2015, Vol. 27 Issue 12, p30 

    The article discusses the vulnerability of health information to cybersecurity threats, with shifts in technology and automation of processes such as movement of electronic medical records (EMRs) to the cloud, and the value of health data to potential thieves. Topics discussed include...

  • Many provider benefits are in the cloud.  // Healthcare Risk Management;Apr2012, Vol. 34 Issue 4, p42 

    In this article, Bernard Rosof, CEO of Quality in Healthcare Advisory Group, a consulting firm in Huntington, New York, comments on the benefits of cloud computing for healthcare providers including patient record protection from disasters, storage and ensuring disaster recovery.

  • Tame the Big Data BEAST. Chavis, Selena // For the Record;Jan2015, Vol. 27 Issue 1, p14 

    The article focuses on the importance of data security for healthcare industry. Topics discussed include the key role of electronic health record (EMR) for health organizations, the need to ensure protection of EMR for faster and effective delivery of clinical data, and the views of Dan West,...

  • Tech Threats to Your Practice. Capko, Joe // Podiatry Management;Aug2014, Vol. 33 Issue 6, p59 

    The article offers tips for podiatry professionals on how to protect medical-related data from cyber theft. Topics discussed include the need to secure the physical safety of all devices that can access patient data, the factors that motivate the hackers and thieves to steal information and the...

  • Staying on Your Feet. DEGASPARI, JOHN // Healthcare Informatics;Oct2011, Vol. 28 Issue 10, p16 

    CIOs are hard at work coming up with the most effective and affordable strategies for protecting electronic data as their hospitals move forward on electronic medical records. While the rise of cloud computing and declining network costs are offering new opportunities in dealing with potential...

  • Better Data Through IT Governance... LYNNE THOMAS GORDON. Greene, Jan // H&HN: Hospitals & Health Networks;Jun2014, Vol. 88 Issue 6, p38 

    An interview with American Health Information Management Association chief executive officer (CEO) Lynne Thomas Gordon is presented. In this article, Gordon talks about the need for hospitals' top management to ensure information technology (IT) governance, and the responsibility of the health...

  • editor's note. Cyber Wards and the Battle for Patient Care. weinstock, matthew // H&HN: Hospitals & Health Networks;Sep2015, Vol. 89 Issue 9, p8 

    This article discusses cybersecurity incidents involving the website AshleyMadison.com, automaker Fiat Chrysler, and medical device company Hospira. Topics covered include the breach of AshleyMadison.com, the hacking into the computer system of a car manufactured by Fiat Chrysler, and security...

  • TOOLS.  // Journal of AHIMA;Apr2014, Vol. 85 Issue 4, p15 

    The article offers information on various new medical tools which includes Randomizer allows providers to exchange data with a test electronic health record (EHR), launch of the firm, Ambient Clinical Analytics, to provides clinical decision support tools by a team from the Mayo Clinic and...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics