While the federal government is enticing healthcare providers with billions of dollars in stimulus funding to digitize patient health data, the feds also appear serious about the data privacy and security concerns these efforts raise.
While the federal government is enticing healthcare providers with billions of dollars in stimulus funding to digitize patient health data, the feds also appear serious about the data privacy and security concerns these efforts raise.In addition to the much talked-about "meaningful use" incentive programs of the American Recovery and Reinvestment Act's HITECH legislation, the $20 billion-plus stimulus bill also contains several provisions to address privacy and security.
Last week, the U.S. Dept. of Health and Human Services took steps to carry out a couple of those HITECH privacy and security requirements.
For starters, HHS' Office of National Coordinator for Health IT (ONC) appointed its first chief privacy officer, a role mandated by ARRA. Named to fill the new job was Joy Pritts, a lawyer and associate research professor at Georgetown University, who will advise HHS and ONC on electronic health data privacy and security issues related to HITECH programs.
Before her appointment to the new post, Pritts was already a familiar face around health IT circles and within the ONC. As a senior scholar at Georgetown's O'Neill Institute for National and Global Health Law and a research associate at its Health Policy Institute, Pritts worked with ONC on a series of legal surveys of state laws. That research focused on topics including individuals' rights to access their health information; the transmission of prescriptions; and consent requirements for disclosing health information for treatment.
In another cybersecurity related move last week, HHS posted a "pre-solicitation" for a contractor to study the security and privacy risks to health IT.
"The purpose of this contract is to carry out a sequence of related activities with the goal of understanding security risks to Health Information Technology, planning and executing risk mitigation strategies, testing certain risk mitigation strategies, communicating to stakeholders the results, lessons learned, and actions that can be taken to reduce risk in HIT, which will create the foundation for policy development," said HHS in the posting.
Key to the advancement of HITECH programs "is the assurance of safety and security" of health IT, according to the posting. "These include promoting security and accuracy of health information and the protection of privacy through data segmentation and prevention of unauthorized access."
So, as the feds move toward finalizing the "meaningful use" requirements that healthcare providers must meet to receive their financial rewards, it's also pertinent that security and privacy issues are also tackled so that damaging (and embarrassing) breaches don't unfold when the HITECH programs finally come to life.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.