Privacy Officers in healthcare settings have a critical role to play. They need to guide their organizations in monitoring emerging risks and establishing responsible data sharing practices.Privacy Officers can help their organizations effectively limit risk when releasing data by: locating sources of PHI in their data; using effective de- identification; benchmarking against best practices; assessing security incidents; basing data sharing agreements on context; and, engaging with experts.
Privacy Analytics is proud to introduce The State of Data Sharing for Healthcare Analytics 2015-2016, a comprehensive and informative survey on health data sharing and analytics. Over 300 industry professionals were involved, representing C-suite executives, Privacy and Compliance Officers, Data Analysts and Legal Counsel (to name a few). The key goals of this survey were to gain insight into healthcare organizations needs around protecting patient privacy, the challenges they face and the approaches they are taking to minimize risk when sharing sensitive data.Some noticeable findings in the survey include:· A lack of total confidence in the ability to protect privacy;· The demand for data is growing as fast as the amount of data is being collected;· Individuals lack familiarity with advanced methods of de-identifying data;· Most organizations use approaches that can result in high risk datasets;· Healthcare organizations are slowly starting to monetize their data assets;· And much more!
Attaining true transparency in drug trials calls for a better solution than excessive redaction. Learn the drawbacks and benefits of the different methods for anonymization in clinical trials. There is potential for strong industry leaders to emerge — so long as they align themselves with best practice guidelines. By making the right choices now, pharmaceutical organizations will meet the new transparency mandates while complying with privacy regulations and maximizing the quality of data that can be shared for secondary purposes.
The growth in the use of electronic medical records, electronic insurance claims processing and other hospital software systems has led to a rise in the collection and storage of personal health information. Beyond the provision of patient care, this information can be invaluable in driving innovative research and providing new insights to address challenging healthcare problems. De-identification allows for the sharing of personal health information by protecting individual privacy. By de-identifying a dataset, the chance that a person can be identified from their data is drastically reduced.
In this recent white paper, Gregg Malkary, Managing Director of the analyst firm the Spyglass Group, explains the top five ways that replacing pagers with a secure messaging system can enhance care quality, improve care coordination, and potentially save hospitals the $1.75 million per year that they lose using outdated communication technologies.
Whether you’re an owner of a medical practice, a practicing doctor or even a regular employee, HIPAA regulations assign you a personal stake in the security and confidentiality of patient data. This means that should a breach occur, you could be on the hook for millions of dollars in penalties.Download your free copy of HIPAA Security Compliance: 13 Critical BitLocker Settings to Help You on Your Path to Compliance and you'll learn:- How data breach notification rules favor organizations that have encrypted their PHI;- Why encryption of PHI is one of the easiest and cheapest investments your organization can make; and- How to access and expertly implement BitLocker configuration settings.
Migrating healthcare applications to the cloud can be a complex and time consuming process requiring careful planning to ensure a successful transition. HIPAA compliance and advanced PHI security must be core to all considerations to protect your customers and their patients. Based on real-world case studies, in this best practices guide you’ll gain important insights into the following:· Developing a Strategic Vision· Key Migration Considerations· Migration Process Overview· Keys to Success: Documentation, Communication, Coordination· Benefits: Agility, Cost Savings, Focus