Determine Exposures By a Thorough Security Risk Analysis
How to Conduct a Rigorous Security Risk Analysis By Bob Chaput, CEO of Clearwater Compliance LLC Last year, HIPAA privacy, security and breach notification rules…
Read MoreHow to Conduct a Rigorous Security Risk Analysis By Bob Chaput, CEO of Clearwater Compliance LLC Last year, HIPAA privacy, security and breach notification rules…
Read MoreHealth Information Technology in 2013 William Hersh, MD, Professor and Chair, OHSU Blog: Informatics Professor The year 2013 was not a great year for health…
2014: CMS EHR Incentive Audit Risk – Patient Engagement and Portals By Jim Tate, EMR Advocate Meaningful Use Audit Expert Twitter: @JimTate, eMail: audits@emradvocate.com EHR…
A Standard Model For Evaluating Return On Investment From Electronic Health Record Implementation The Institute of Medicine (IOM) is a nonprofit organization providing unbiased and authoritative research…
Flawed Accounting By Barry Chaiken, MD, MPH, CMIO, Infor Follow him @bchaiken For more than a half century, the healthcare industry applied a flawed business…
Another Gratifying Year William Hersh, MD, Professor and Chair, OHSU Blog: Informatics Professor It has become a tradition for this blog for my last posting of…
Small Thumb Drive Brings Large HIPAA Penalty By Mike Semel Blog: 4Medapproved.com/HITSecurity Twitter: @SemelConsulting My late uncle would not understand the latest HIPAA penalty for…
Logicalis USÂ Fifth Annual Tech Trends Reveals What CIOs, CTOs are Talking about Most What technologies and trends do IT experts have on their minds for…
Health Care Delivery, Information Exchange and the Future of Electronic Quality Measurement CMS Communication from Robert Tagalicod, Director, Office of E-Health Standards and Services We…