Erin McCann
A state health agency is mailing out HIPAA breach notification letters after a technical glitch sent out letters containing protected health information to the wrong recipients.
An appellate court has cleared Advocate Medical Group of wrongdoing in a class action lawsuit alleging the organization failed to protect patient data following a massive HIPAA data breach.
Researchers at University of Washington Tacoma have developed a machine-learning predictive analytics tool that forecasts with 82 percent accuracy the probability a patient will be readmitted within 30 days.
Interoperability
The U.S. Coast Guard has taken the next step to integrate its health information systems and records after tapping an interoperability platform to make it happen.
2015 thus far has been the year of hackers targeting the healthcare industry. And they don't appear to be slowing down. Just last week, another business associate notified individuals that their protected health information was stolen following yet another "sophisticated cyberattack."
The popular crowd-sourced review site Yelp is teaming up with an unlikely partner to put more healthcare facility data and reviews into the hands of the consumer.
A pair of IT security researchers have successfully designed a worm that will break into a Mac's operating system, widely considered more impenetrable than its PC counterpart. And there are huge implications for the healthcare industry.
Critical technologies -- including the electronic health record platform -- at a health network in Missouri went black this past week, and stayed down for 20 hours.
The Centers for Medicare & Medicaid Services has paid out more than $30 billion in EHR incentive payments to hospitals and providers who have attested to meaningful use as of March 2015. Which platforms were used for attestation? We have some helpful charts that break it down for you.
A two-hospital health system in Indiana is notifying its patients that their protected health information and Social Security numbers have been compromised following a phishing attack. What's more, cyberattackers were able to swipe data unchecked for more than a year.