Privacy & Security
Does your organization have a comprehensive data governance program? If not, you're not alone. But you're also not close to where you should be if you want to provide better care at lower cost, according to a new report.
Healthcare's all about the patients, right? But far too often, there's a disconnect -- the idea that the care ends when the patient exits the building or a diagnosis is made, the idea that clinical deals with clinical and information technology deals with IT.
Apple on Monday touted its working with the Mayo Clinic as it rolled out an app that would piece together healthcare information from many third-party apps -- including one from Mayo -- to give consumers a comprehensive medical view on a mobile device.
It seems that everybody under the sun has been asking "you're in the cloud, right?" But it's important to take a step back and realize that not all clouds are equal. Maybe it's time for people to be asking, "Are you doing the cloud right?"
Identity management and unauthorized data access by employees present the biggest threat to security and privacy of patient data, according to healthcare providers across the country.
Working on the patient portal portion of Stage 2 meaningful use? Officials at Mayo Clinic can offer some valuable insight into their own portal rollout -- challenges that have arisen, privacy concerns and how to do it right.
Information is money. And data brokers, companies that mine consumers' personal information and sell to the highest bidder, know this more than anyone. Their practices in collecting said data, however, have recently come under fire.
Returning service members are looking for jobs. Healthcare IT departments are desperate for qualified candidates. What special skill sets can veterans bring to the table?
There's a little bit of good news in the healthcare IT arena: CEOs and CIOs are quickly moving to make hiring chief information security officers a top priority.
Kaiser Permanente's Jim Doggett talks about the policies and practices that go into the planning of a secure environment.