Quantcast
Channel: Software Technology
Viewing all articles
Browse latest Browse all 25

Responsible Care of Patient Information

$
0
0
by Dave Gilmore, Chairman - StrongCord Systems

PODCAST HERE:http://www.blogtalkradio.com/pharmacytechnology/2010/03/03/ptr-podcast-episode-15-responsible-care-of-pharmac

As required by section 13402(e)(4) of the HITECH Act, the Secretary of the Department of Health and Human Services for the Federal Government must post a list of breaches of unsecured, protected health information affecting 500 or more individuals.

In the fourth quarter of 2009, twenty-five Companies reported breaches affecting 1,045,172 individuals. This does not include the unreported thousands of other breaches affecting less than 500 individuals estimated at close to 1,000,000 more being affected.

The reported breaches listed the following causes:
• Theft of Laptop
• Theft of Hard Drive
• Theft of Portable USB Device
• Theft of Paper Records
• Theft of Desktop Computer
• Theft of Backup Tapes
• Theft of CDs
• Loss of Backup Data Tapes
• Unauthorized Access
• Misdirected eMail
• Loss of Laptop
• Incorrect Mailing
• Database Hacking
• IT Intrusion

The most valuable, monetize-able asset, U.S. healthcare has is its data. The criticality of patient data drives pharmaceutical development, bounds insurance actuarial policies, fills tomes of learning for all healthcare related education, drives strategic placement and development of healthcare related construction, and on and on the list goes. Make no mistake about it, the U.S. Healthcare industry of over $2.3 Trillion Dollars is driven and bounded by patient data/information.

On the downside, patient data is the most sensitive information about any given individual. It reveals social security identification, home address information, insurance coverage information, health history information, medication management information, and sometimes psychological and behavioral life patterns and history. Any or all of this can be used harmfully against a patient in myriad ways. Additionally, fraud on a massive scale can be perpetrated using falsified identities for monetary gain and deeper intrusion into various healthcare industry corporate organizations.

Prominent national security analysis think tanks like Rand Corporation and Brookings Institute believe such fraud has direct implications to U.S. national security via funding of terrorist activities and strategic mis-use of data.

What are you doing to protect the healthcare data and patient information in your possession? What measures have you put in place to ensure safety of these critical assets?

A fundamental approach to data and information protection involves personnel orientation, performance accountability, measurable workflow processes, and keen use of technology across an organization.

Get the help you need to address this issue in your organization before it’s too late. Both our economy and our safety are at stake.

http://www.strongcordsystems.com/
877.761.2038 x 5001

Viewing all articles
Browse latest Browse all 25

Latest Images

Trending Articles





Latest Images