Wednesday, April 23, 2014

DeSalvo : Patient Data Privacy is Important to Regulators

The new head of the Office of National Coordinator for Health IT (ONC), Karen DeSalvo, says privacy and security are vital to all their major projects.

According to Dr. DeSalvo, the more widespread use of electronic medical records (EHRs) has improved healthcare delivery but also makes privacy of patients' health information a priority.

"We consider privacy and security an important part of the work that we do."
- Karen DeSalvo, MD, Office of the National Coordinator for Health IT
DeSalvo noted that patients are willing to share their medical information to contribute to research but want their privacy protected. To ensure that access to a patient's EHR is appropriate healthcare organizations can utilize low-cost on-demand SaaS analytics services.
Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) ONC's DeSalvo on Privacy, Security - www.HealthInfoSecurity.com, 04/21/2014

Tuesday, April 22, 2014

Prison for Tax Fraud Using Patient Data Stolen from Medical Services Provider by Employee

A Lauderhill, Florida man, Andrew Ware, will spend almost six years in prison, followed by three years probation, for his role in an ID theft and tax refund fraud scheme; he is the sixth in the ring to be sentenced>.

His cousin, Latonya Ware, was an employee of a medical services provider and stole patients' identities to file fraudulent tax returns, according to federal prosecutors.

"The group submitted fraudulent tax refund claims for $137,132 and made $49,561 in unauthorized credit and debit card purchases."
- Sun Sentinel
It seems the medical services company first learned of the identity thefts from law enforcement. Healthcare organizations don't have to wait until law enforcement arrives, they can proactively detect patient identity thefts with low-cost on-demand SaaS analytics services.
Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
> Sources:
(a) Lauderhill man gets five years in ID theft, tax fraud scheme - www.SunSentinel.com, 04/18/2014

Monday, April 21, 2014

Restaurant Employee ID Theft, Tax Fraud

Tekia Jones pleaded guilty to identity theft of 118 fellow employees' names, social security numbers at a national fast food restaurant chain. With an accomplice, Ivory Covigton, the stolen identities were then used to file 57 fraudulent tax returns for a refund fraud scheme. Sentencing is scheduled for June 24, 2014.
"Jones had access to employees’ names, social security numbers and dates of birth, but did not have permission to possess the employees’ information outside of her employment."
- US Attorney's Office, Southern District of Florida
From the court documents it appears the restaurant chain was unaware of the identity thefts until law enforcement contacted them. However, rather than learn of employee or customer identity thefts, organizations can proactively detect such thefts, even by authorized users, with low-cost on-demand SaaS analytics services.
Download a white paper on identity theft detection. Learn how to proactively identify unauthorized breaches of personal information, even by authorized users - with no hardware and no on-site software.
Sources:
(a) Former National Fast Food Restaurant Chain Employee And Co-Defendant Plead Guilty In Identity Theft Tax Fraud Scheme - www.Justice.gov, 04/16/2014

Friday, April 18, 2014

Key Attributes of Compliance Officer?

"A corporation C-suite is no longer complete without a chief compliance officer (CCO)," according to Alexandra Wrange, of Trace, a non-profit compliance organization.

Wrage notes finding a CCO who will foster a culture of compliance requires just the right skillset.

"Fostering a culture of compliance can be a daunting task and requires just the right skillset."
- Alexandra Wrage, President, Trace, non-profit compliance organization
She lists Flexibility, Diplomacy, Tenacity, Sensitivity, and Vision, as key attributes for a CCO. What would be on your list of key attributes for a chief compliance officer?
Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) Finding the Right Chief Compliance Officer - www.CorpCounsel.com, 04/16/2014

Thursday, April 17, 2014

Health IT Among Hottest Careers

High job growth in the health IT field is expected to continue in the next decade, according to the US Bureau of Labor Statistics.

Healthcare organizations are looking to hire health IT professionals who have the “right stuff” -- in addition to education and experience communication skills and integrity contribute to a successful career.

"Due to the convergence of government regulations, mobility, and emerging technologies to improve patient health information as well as patient care, a robust health IT market has been created."
- HIMSS
The shortage of experienced health IT professionals available for hire has led some organizations to utilize SaaS services. One example is low-cost on-demand SaaS analytics services for proactive detection of identity theft and privacy breaches.
Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) A Successful Career in Health IT Takes the Right Stuff - www.HIMSS.org, 04/15/2014

Wednesday, April 16, 2014

Navy Yard Shooter's Health Records Snooped

Subsequent to Aaron Alexis killing a dozen people at the Washington Navy Yard last September, the Air Force noted a spike in the number of personnel inappropriately accessing his electronic medical record (EMR).

Such snooping is illegal under the Health Insurance Portability and Accountability Act (HIPAA) and was so extensive that the Air Force Medical Operations Agency Director Brig. Gen. Sean Murphy to issued a medical command reminder of policy and law.

The illicit peeks were a “violation of the most fundamental trust our patients place in us every day. Breaches of this nature are clearly in violation and are plain and simply wrong."
- Air Force Medical Operations Agency Director Brig. Gen. Sean Murphy
With EMRs now widely used in federal and private health facilities, breaches of patient privacy are on the rise, from "one-time looks to the jaw-dropping unauthorized breach of 4.5 million Tricare records in 2011 — the largest compromise of health information recorded since reporting requirements changed in 2009."

Healthcare organizations can proactively detect inappropriate access, even by authorized users, with low-cost on-demand SaaS analytics services.

Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) Your medical files may be at risk - www.MilitaryTimes.com, 04/15/2014

Popular Posts

Copyright © 2010-2011 by Veriphyr Incorporated, All Rights Reserved.

Contact us at Veriphyr.com.