By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: Recommendations for Healthier Organizations in 2013: Data Security
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > eHealth > Recommendations for Healthier Organizations in 2013: Data Security
eHealth

Recommendations for Healthier Organizations in 2013: Data Security

thielst
thielst
Share
6 Min Read
SHARE

It’s time for some New Year’s resolutions; and they have nothing to do with eating right, losing weight or exercising.  Instead, they have everything to do with protecting against the organizational and financial stresses of data breaches—which have become an everyday disaster.

It’s time for some New Year’s resolutions; and they have nothing to do with eating right, losing weight or exercising.  Instead, they have everything to do with protecting against the organizational and financial stresses of data breaches—which have become an everyday disaster.

As noted in a post last month, the Third Annual Benchmark Study on Patient Privacy & Data Security, reports that data breaches in healthcare are growing; insider negligence is the root cause; and mobile devices pose threats to patients’ protected health information (PHI). Despite the fact that 94percent of healthcare organizations surveyed suffered data breaches, data breaches don’t have to be disastrous if organizations take steps to operationalize pre-breach and post-breach processes to better protect patient data and minimize breach impact.

The results of this survey have lead to a few of us bing invited to share our recommendations for a healthier organization in 2013 and beyond:

More Read

mHealth
Mobile Health Around the Globe: Beddit Tells You How You Slept and How to Do It Better
Why Digital Marketing is an ROI Life-Saver for Clinical Trials
The STAT Ten: Tim Moore Speaks Out On Innovation, Technology and Digital Health
Expanding Your Social Media Networks
Dispelling the Myths of a Healthcare IT Investment ‘Bubble’

1. Establish mobile device and Bring Your Own Device (BYOD) policies that include technical controls and employee and management procedures.

Rick Kam, CIPP/US, president and co-founder, ID Experts

2.  Control the cloud or it’ll control you. Make it a point to fully understand what cloud service-level agreements mean in practice and then push for meaningful information on failover and disaster recovery practices used.”

Richard Santalesa, senior counsel, InfoLawGroup LLP

3.  Have a current breach response plan that is ready and tested. This will help pave the way for a well-executed response that can mitigate the financial, legal and reputational harm caused by a security incident involving patient information.

Marcy Wilder, partner and director of global privacy and information management practice, Hogan Lovellis

 4.  Conduct small but focused risk assessments rotating control review on a monthly basis to continually understand and measure risk. Most importantly, have a plan to address the risk, through remediation, mitigation or risk transfer activities.

Chad Boeckmann, president and chief strategy officer, Secure Digital Solutions, LLC

5.     Immunize mobile devices against viruses that might steal patient data.

Dr. Larry Ponemon, chairman and founder, Ponemon Institute

 6.       Attack your leadership team with phishing and other social engineering campaigns. Nothing raises awareness like catching people and correcting them on the spot—and it’s a lot more interesting than the annual 30-minute online security training.

Michael Boyd, Director of Information Security Management, Providence Health & Service

7.     Use a checklist to evaluate periodically whether covered entities and business associates are in compliance with all privacy and security requirements. Sign and date the checklist to show that your organization is not guilty of “willful neglect” in complying with privacy and security laws.

Jim Pyles, founding partner, Powers, Pyles, Sutter & Verville, P.C.

 8.      Educate all staff to recognize applications, mobile devices and medical equipment that collect, contain or transmit patient information and/or biometric data; and train them to communicate the risk to those responsible for information security management.  

Christina Thielst, FACHE, Vice President, Tower

 9.     Decide how to handle the residual risk of a data breach, how much risk to accept, and how much, if any, risk to transfer through cyber insurance.

Christine Marciano, President, Cyber Data Risk Managers LLC

 10.Boards should ensure their organizations have robust, board-reviewed and approved security policies and procedures.

Larry W. Walker, president, The Walker Company

 11.   “Big data” is a source of both the disease and the cure for privacy and information security symptoms. Currently, we have to deal with data minimization, but in the future, look for applications that may collect broadly, but protect against unauthorized disclosure or misuse very, very well.

Jon Neiditz, partner, Nelson Mullins Riley & Scarborough LLP 

 Rick Kam, president and co-founder of ID Expertis isn’t a physician, but he believes  “patient information is at risk for infection” and “organizations need to make a commitment to a healthier organization from top to bottom, otherwise a common cold data breach will turn into tuberculosis.”  I have to agree and in some respects it is just another HAI – hospital acquired infection.

Also, one more recommendation is in order…. be careful with #6.  It could lead to a bit of personal risk — otherwise known as a CLM or “career limiting move”.

TAGGED:data security
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5KFollowersLike
4.5KFollowersFollow
2.8KFollowersPin
136KSubscribersSubscribe

Latest News

ADHD in adulthood
ADHD In Adulthood And Its Lasting Effects
Health
January 27, 2026
3d printing in modern medicines
From Concept To Care: How 3D Printing Is Reshaping Modern Medicine
Infographics Technology
January 27, 2026
titanium importance in healthcare
Why Titanium Matters In Modern Medicine
Health Infographics
January 27, 2026
Beautiful woman manager communicates with the client in the work
Can We Lower Healthcare Costs Outsourcing to the Philippines?
Health
January 24, 2026

You Might also Like

patient engagement
eHealthMobile HealthTechnologyWellness

Patient Engagement in Healthcare: Stewards of the Brand Promise

February 8, 2014
fitness and health apps
eHealthMobile HealthWellness

Top 10 Fitness Apps to Stay Fit

June 14, 2013

The Iceberg Waiting for Your Health Care Data

May 1, 2014

Transforming the Experience and Delivery of Health Care at the Mayo Clinic

September 9, 2013
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?