Friday, April 18, 2014

Key Attributes of Compliance Officer?

"A corporation C-suite is no longer complete without a chief compliance officer (CCO)," according to Alexandra Wrange, of Trace, a non-profit compliance organization.

Wrage notes finding a CCO who will foster a culture of compliance requires just the right skillset.

"Fostering a culture of compliance can be a daunting task and requires just the right skillset."
- Alexandra Wrage, President, Trace, non-profit compliance organization
She lists Flexibility, Diplomacy, Tenacity, Sensitivity, and Vision, as key attributes for a CCO. What would be on your list of key attributes for a chief compliance officer?
Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) Finding the Right Chief Compliance Officer - www.CorpCounsel.com, 04/16/2014

Thursday, April 17, 2014

Health IT Among Hottest Careers

High job growth in the health IT field is expected to continue in the next decade, according to the US Bureau of Labor Statistics.

Healthcare organizations are looking to hire health IT professionals who have the “right stuff” -- in addition to education and experience communication skills and integrity contribute to a successful career.

"Due to the convergence of government regulations, mobility, and emerging technologies to improve patient health information as well as patient care, a robust health IT market has been created."
- HIMSS
The shortage of experienced health IT professionals available for hire has led some organizations to utilize SaaS services. One example is low-cost on-demand SaaS analytics services for proactive detection of identity theft and privacy breaches.
Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) A Successful Career in Health IT Takes the Right Stuff - www.HIMSS.org, 04/15/2014

Wednesday, April 16, 2014

Navy Yard Shooter's Health Records Snooped

Subsequent to Aaron Alexis killing a dozen people at the Washington Navy Yard last September, the Air Force noted a spike in the number of personnel inappropriately accessing his electronic medical record (EMR).

Such snooping is illegal under the Health Insurance Portability and Accountability Act (HIPAA) and was so extensive that the Air Force Medical Operations Agency Director Brig. Gen. Sean Murphy to issued a medical command reminder of policy and law.

The illicit peeks were a “violation of the most fundamental trust our patients place in us every day. Breaches of this nature are clearly in violation and are plain and simply wrong."
- Air Force Medical Operations Agency Director Brig. Gen. Sean Murphy
With EMRs now widely used in federal and private health facilities, breaches of patient privacy are on the rise, from "one-time looks to the jaw-dropping unauthorized breach of 4.5 million Tricare records in 2011 — the largest compromise of health information recorded since reporting requirements changed in 2009."

Healthcare organizations can proactively detect inappropriate access, even by authorized users, with low-cost on-demand SaaS analytics services.

Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) Your medical files may be at risk - www.MilitaryTimes.com, 04/15/2014

Tuesday, April 15, 2014

Pew: Nearly 1 in 5 Experienced Online Data Breach

Data theft is on the rise according to a January 2014 study by the Pew Research Center.

18% of 1,002 US adults surveyed reported personal information — social security numbers, credit card data, and banking information — had been stolen online. That’s a big increase from the 11 percent reported in a July 2013 survey.

"18% of adults reported personal information — social security numbers, credit card data, and banking information — had been stolen online."
- Pew Research Center
21% of online adults said they’ve had their email or social networking accounts compromised or hijacked without their permission. According to Mary Madden, a senior Pew researcher, the survey reflects "that a rising share of the public say they have experienced a personal data breach."
Download a white paper on data privacy breach detection. Learn how to proactively identify unauthorized breaches of data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) Nearly 1 in 5 U.S. adults say their info has been stolen online - www.VentureBeat.org, 04/14/2014

Monday, April 14, 2014

Exempt Medical Apologies?

Governor Scott Walker of Wisconsin signed a bill on April 8th that allows doctors and other healthcare providers to apologize to patients without worrying if the statements could be used against them in court.

The new law makes apologies, condolences or expressions of sympathy inadmissible in civil proceedings and in administrative hearings concerning the healthcare provider's actions.

"The new law makes apologies, condolences or expressions of sympathy inadmissible in civil proceedings and in administrative hearings concerning the healthcare provider's actions."
- Channel 3000 News
Supporters say the law will encourage open communication between doctors and patients. Opponents, including trial attorneys, say this will make it harder for patients to bring successful malpractice lawsuits. What do you think?
Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) Governor signs web privacy, DNA collection, medical apology bills - www.Channel3000.com, 04/08/2014

Saturday, April 12, 2014

Employee Shared Patients' Info with Competitor

An employee of a urology practice in Tennessee gave the names and addresses of 1,144 patients to a competing medical practice to solicit those patients.

This unauthorized sharing of patient information is a violation of federal HIPAA privacy laws, even though Social Security numbers, financial, or other medical information was not included.

"An employee at a Knoxville urology practice released names and addresses of more then 1,100 patients to a competing medical provider." - Insurance News Net
The breach of patient data, which occurred during 2013 and 2014, was not discovered by the medical practice until patients calling about receiving solicitation letters from a competing provider.

Organizations who want to detect breaches of confidential, rather than learn about them from third parties, can utilize low-cost on-demand SaaS analytics services.

Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) SOURCE_TITLE - www.InsuranceNewsNet.com, 04/12/2014

Popular Posts

Copyright © 2010-2011 by Veriphyr Incorporated, All Rights Reserved.

Contact us at Veriphyr.com.