The Office of the National Coordinator for Health Information Technology has formally launched Query Health, a project to test standards for querying data from electronic health records to conduct research.
Although those in the field understand very well that the CFPB will have an enormous impact on privacy policy-making responsibilities, questions remain about what the agency will actually do.
Conducting a thorough self-assessment is the best way to prepare for the upcoming HIPAA privacy and security rule compliance audits, regulators and other experts advise.
A repentant SparkyBlaze wants to go legit, leaving behind the hacktivism he helped foster as a member of Anonymous and start a career in the U.S. as a ethical hacker. As proof, he's offering advice to protect IT from hackers.
Facial recognition technology could prove to be an effective way to authenticate individuals seeking entry to secured buildings or databases storing sensitive information. But the biometric technology already is being abused, and IT security managers employing facial recognition should be careful to encrypt the...
The bright spot is that 36 percent of the takeover incidents reported in 2010 were stopped before fraudulent funds transfers were approved. That's an improvement from 2009, when only 20 percent were thwarted.
As social media continues to evolve and new threats continue to emerge, organizations must constantly re-evaluate their policies and conduct risk assessments, says Andrew Kennedy, who heads up social media policy for BITS.
When it comes to banning the use of social media in the workplace, Jenny Corotis Barnes, assistant general counsel at Ohio State University Medical Center, has a strong opinion: Forget about it.
When it comes to banning the use of social media in the workplace, Jenny Corotis Barnes, assistant general counsel at Ohio State University Medical Center, has a strong opinion: Forget about it.
This white paper details solutions designed for government agencies that provide the visibility, control and automation needed to support asset management across the IT asset life cycle, planning, acquisition, management and disposition of software, hardware and related licenses.
The result is lower asset costs,...
Federal authorities are launching several pilots to test metadata standards that could help pave the way for secure nationwide electronic health information exchange.
A hospital CIO calls for studies of how best to match patients to their records, citing the issue as critical to the success of health information exchanges.
International collaboration, steeper convictions for those who are caught and government support for the cyberfight are fueling positive progress in the fight against cybercrime.
Trust has been a murky trait on the Internet since its inception. Remember the New Yorker cartoon? A dog, sitting by a PC, says: "On the Internet, nobody knows you're a dog." It's hard to trust what you see on the Net. That's more true today than ever.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.