{"id":99485,"date":"2014-01-09T01:45:05","date_gmt":"2014-01-09T06:45:05","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/health-care-data-breach-growth-in-2014.php"},"modified":"2014-01-09T01:45:05","modified_gmt":"2014-01-09T06:45:05","slug":"health-care-data-breach-growth-in-2014","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/health-care\/health-care-data-breach-growth-in-2014.php","title":{"rendered":"Health Care Data Breach Growth in 2014"},"content":{"rendered":"<p><p>    2013 saw a monumental number of data breaches, and health care    was not immune. These breaches collectively compromised    millions of individuals' personally identifiable information    (PII) and protected health information (PHI). Within the health    care field, many of the reported data breaches were not    perpetrated by sophisticated hackers but were the result of    individuals making poor choices. Small and medium size    businesses within the health care field, including health care    providers and business associates, are working to comply with    the new Health Insurance Portability and Accountability Act    (HIPAA) reporting requirements. The new HIPAA security rule    requires data breach notification and mentions possible    financial penalties in the event that PII and PHI are    compromised. Poor choices by employees can and do undermine    even carefully constructed information security structures    designed to be HIPAA compliant.  <\/p>\n<p>    Forecast for 2014  <\/p>\n<p>    The 2014 forecast is not good, according to InformationWeek.    The size and quantity of health care data breaches are expected    to grow as the U.S. Affordable Care Act is implemented. Small    and medium practices will discover that data management is an    integral part of the business of medical care. IT teams and IT    service providers have an opportunity to distinguish themselves    during this period of flux and to implement proven security solutions and security awareness    programs.  <\/p>\n<p>    There is a saying that one should treat sensitive information    and cash in the same manner: Do not leave it lying about;    secure it, and count it regularly. PII and PHI are no    exceptions to the axiom. IT solutions may start with ensuring    that patient information is an accountable item by using the    HIPAA physical and technical safeguards to guarantee compliance    and taking client data security even farther beyond compliance.    Cyber attacks receive attention and headlines, but human error    puts data at risk more often than hacks.  <\/p>\n<p>    Security Awareness  <\/p>\n<p>    Security awareness training, specifically surrounding the    implementation of IT solutions and the physical handling of    data, allows those closest to PII and PHI to understand how    their actions can keep data safe or put the organization at    risk of a data breach. Security awareness training should    include several aspects: The preferred manner for the handling    of paper files; the access controls placed on electronic    medical records; the proper method to expunge medical data from    systems and medical monitoring equipment; best practices for    manual and automatic data storage and backup; prescribed    channels to use to report an anomalous event.  <\/p>\n<p>    With attention to detail, the probability of human error is    reduced. With a reduction in human error, perhaps the    prognostication of 2014 as a banner year for data breaches in    health care will prove to be incorrect.  <\/p>\n<p>    This post was written as part of the IBM for Midsize    Business program, which provides midsize    businesses with the tools, expertise and solutions they need to    become engines of a smarter planet. Like us on Facebook. Follow us on    Twitter.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<\/p>\n<p><a target=\"_blank\" href=\"http:\/\/midsizeinsider.com\/article\/health-care-data-breach-growth-in-2014\" title=\"Health Care Data Breach Growth in 2014\">Health Care Data Breach Growth in 2014<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> 2013 saw a monumental number of data breaches, and health care was not immune. These breaches collectively compromised millions of individuals' personally identifiable information (PII) and protected health information (PHI) <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/health-care\/health-care-data-breach-growth-in-2014.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[6],"tags":[],"class_list":["post-99485","post","type-post","status-publish","format-standard","hentry","category-health-care"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/99485"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=99485"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/99485\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=99485"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=99485"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=99485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}