Tips to overcome PHI security obstacles
Posted on 20 February 2013.
Healthcare organizations’ privacy programs are still understaffed and underfunded, even while millions of patients’ protected health information (PHI) are compromised.

Securing PHI in healthcare is an obstacle, with 94 percent of healthcare organizations suffering data breaches in the past two years, according to the Third Annual Benchmark Study on Patient Privacy & Data Security. Organizations face new challenges with the recent release of the HIPAA Final Omnibus Rule.

For those responsible for managing privacy and data security at healthcare organizations, industry experts offer six tips to overcome PHI security obstacles:

1. We don't do privacy because of HIPAA; we do it because it's part of quality patient care. Make sure we get value for our investment in privacy. - Jim Anderson, principal, Risk Masters.

2. Invest in your people. Train them on policies and procedures. Post and send security reminders. Reward compliance; sanction non-compliance. Make your people an asset, not a liability. - Mary Chaput, chief financial and compliance officer, Clearwater Compliance.

3. An essential risk management exercise for your privacy program is to protect PHI. Be sure you know where PHI is being collected, used, shared, and transferred and how and when PHI is securely destroyed. Map your data, classify it, and then securely dispose of it on schedule to lower the risks and costs of excess storage. - Ellen Giblin, privacy counsel, The Ashcroft Group.

4. Understand the value of the PHI in your organization in order to determine the appropriate level of investment to protect it. A core goal of the forum is to help participants calculate these values. - Rick Kam, president and co-founder of ID Experts.

5. With liability risks around PHI privacy escalating, business associates and subcontractors should consider purchasing cyber insurance to help mitigate the rising financial risk. - James C. Pyles, principal, Powers Pyles Sutter & Verville PC.

6. Develop a clear concept of how PHI protection will work. Recognize that a change in organizational culture may have to take place. Develop a written statement of benefits. Set reasonable goals. - Dick Wolfe, adjunct professor of health care administration, Washington Adventist University.





Spotlight

The psychology of phishing

Posted on 23 July 2014.  |  Cybercriminals no longer send out thousands of emails at random hoping to get a handful of hits, today they create highly targeted phishing emails which are tailored to suit their recipients.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Jul 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //