Privacy & Security

By Resource Central 12:29 pm May 16, 2012
While the HIPAA Privacy Rule covers protected health information (PHI) in all forms, the HIPAA Security Rule specifically applies only to PHI that is maintained, transformed, or transmitted in electronic form (e-PHI). The Security Rule requires covered entities to meet specific objectives and presents major challenges for virtually every covered...
By Resource Central 10:12 am May 07, 2012
As employees bring their mobile devices to the workplace, while it may increase productivity and reduce cost, it also causes security weaknesses. Download this paper to learn more about mobile security device threats and how to establish a mobile security strategy.
By Resource Central 10:43 am April 18, 2012
About 39% of medical offices in the U.S. have adopted EMR technology, according to SK&A. With Medicare and Medicaid incentive payments now available to physician practices and hospitals who make Meaningful Use of such technology, that number is expected to rise over the next several years. But what about the practices who have not yet embarked...
By Resource Central 11:05 am March 29, 2012
The United States is undergoing a major transformation of its healthcare delivery system, driven by federal health IT investments and healthcare reforms. This content piece features information from a joint presentation at the HIMSS12 Annual Conference & Exhibition in Las Vegas in February, where Eric Dishman, General Manager of Health...