Tom Sullivan
National coordinator Karen DeSalvo, MD, revealed on Tuesday that ONC now has a new Chief Privacy Officer. "She brings a set of rich experiences at the intersection of health information, privacy, and modernizing the health care delivery system," DeSalvo wrote in an email to staff.
Will hospitals be forced to buy HP desktops, laptops and printers from one group and the servers that connect them from another?
The healthcare industry has traditionally been knocked for its slowness in adopting technology. A new Harvard study suggests that being late to the IT party could seriously hamper business growth.
"Just by having an app on your device, (a cybercriminal) can determine your call history, take your contact list info, if they choose to." That's how vulnerable smartphones, tablets and their mobile ilk actually are, Jim Routh said, and it's not just the devices that chief information security officers like him have to worry about.
The exodus from the Office of the National Coordinator for Health IT continued on Monday when it announced that Doug Fridsma, MD, is stepping down from his post as chief scientist.
The head of ONC's Standards and Interoperability efforts is taking a new role: CEO of the American Medical Informatics Association.
IT workers at Trinitas Regional Medical Center know that anyone coming to the hospital is not happy to be there, and CIO Judy Comitto understands that makes the job harder -- and perhaps more rewarding.
Every single IT professional at Children's Hospital & Medical Center makes rounds in a clinical or operational area. That's right, rounds, much like the type clinicians typically conduct.
Texas Health is hardly the only hospital or health network that struggles to convince the CEO, CFO or other board members just how critical funding security initiatives and technologies really is, but it did use a unique approach to get their attention.
With the war already underway, how can hospitals and networks prepare? Chief information security officers share insights about shifting toward more sophisticated information security tactics.