article thumbnail

Health Information Security – My Interview with Richard Kaufmann, CISO of Amedisys – Part 2: Bit by Bit, Putting It Together – Planning, Implementing, Pivoting

Health Populi

The timing of our conversations, tracking both Richard’s and the company’s evolving approach to cybersecurity in health care, has coincided with the Change Healthcare breach and ransom that emerged in February 2024. This second blog of the three is being edited just days after Andrew Witty’s testimony to the U.S. Stay tuned!

article thumbnail

Book: IHE Profiles for Health Information Exchange

Healthcare Exchange Standards

IHE Profiles for Health Information Exchange By Keith Boone He is the author, but he gives credit for pulling from many sources including my blog. I am late to promoting this book, should have done it back in March when it was released. It is called a book, but is available for free download in multiple formats.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Trust In Data Stewardship Is Healthcare Providers’ To Lose

Health Populi

One of the SMA objectives is to consider the Conference in advance and offer thoughts about what we’ll expect, which I did here in the HIMSS blog space. Furthermore, data can be scraped for all kinds of purposes, outside of the context of health care in which patients and health consumers originally share their data.

FHIR 255
article thumbnail

Listen Up, Healthcare: Hear The Patient’s Voice!

Health Populi

One patient could talk with another over their proverbial neighborhood fence, a concerned parent at the PTA meeting with others dealing with a children’s health issue, or a recovering alcoholic testifying in person at an AA session. Fifty-five percent of patient influencers said that privacy concerns have not changed their use of Facebook.

article thumbnail

The Promise of Digital Health and the Privacy Perils – HealthConsuming Explains, Part 4

Health Populi

For CHCF that year, I wrote Here’s Looking at You: How Personal Health Information is Being Tracked and Used , I took cues from a 60 Minutes ‘ profile of third-party data brokers and Latanya Sweeney’s groundbreaking research at the Harvard Privacy Lab.

article thumbnail

Protecting Patient Health Information in the Workplace

Telebehavioral Health Institute

Protecting Patient Health Information in the Workplace A large portion of healthcare breaches occur due to human error, whether it is a lost/stolen device, clicking on a phishing email, or accidental disclosure of protected health information (PHI). Protecting patient health … Read more.

article thumbnail

Healthcare Information In-Security Is the New Normal

Health Populi

I explain th e current state of cybersecurity and health data insecurity in a new HIMSS blog linked here. You’ll see updates on the topic from Ponemon Institute, UPMC’s report on connected healthcare, and Merlin International, weaving the story of American health care’s cyber-deficits.