TITLE

Holes in the fence? In an era of expanding electronic interchange, privacy protections are being put to the test

AUTHOR(S)
Conn, Joseph
PUB. DATE
November 2010
SOURCE
Modern Healthcare;11/22/2010, Vol. 40 Issue 47, p26
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The author comments on the need for more protection of patient information under the Health Insurance Portability and Accountability Act (HIPAA) in the U.S. According to the author, the American Recovery and Reinvestment Act of 2009 has skewed the regulatory action of HIPAA but still protects providers, payers and clearinghouses. The author also talked about Code of Federal Regulations (CFR) which requires, in most cases, written patient consent for the disclosure of drug or alcohol treatment records. INSETS: PERMISSION REQUIRED;ALL THEY HAVE TO DO IS ASK.
ACCESSION #
55664018

 

Related Articles

  • Holes in the fence? In an era of expanding electronic interchange, privacy protections are being put to the test. Conn, Joseph // Modern Healthcare;11/22/2010, Vol. 40 Issue 47, p26 

    The author comments on the need for more protection of patient information under the Health Insurance Portability and Accountability Act (HIPAA) in the U.S. According to the author, the American Recovery and Reinvestment Act of 2009 has skewed the regulatory action of HIPAA but still protects...

  • Currents in Contemporary Bioethics. Rothstein, Mark A. // Journal of Law, Medicine & Ethics;Summer2012, Vol. 40 Issue 2, p394 

    No abstract available.

  • The Medical Science DMZ. Peisert, Sean; Barnett, William; Dart, Eli; Cuff, James; Grossman, Robert L.; Balas, Edward; Berman, Ari; Shankar, Anurag; Tierney, Brian // Journal of the American Medical Informatics Association;Nov2016, Vol. 23 Issue 6, p1199 

    Objective: We describe use cases and an institutional reference architecture for maintaining high-capacity, data-intensive network flows (e.g., 10, 40, 100 Gbps+) in a scientific, medical context while still adhering to security and privacy laws and regulations.Materials and...

  • ID theft -- Should you spend more on security?  // Same-Day Surgery;Jul2011, Vol. 35 Issue 7, p73 

    The article reports on an annual survey which is conducted by the Healthcare Information and Management Systems Society and investigates medical identity theft at health care facilities.

  • ID theft -- Should you spend more on security?  // Same-Day Surgery;Aug2011 Supplement, p18 

    The article reports on the results of a survey on identity theft in health care facilities which was conducted by the Healthcare Information and Management Systems Society.

  • A Study to Elicit Behavioral Health Patients' and Providers' Opinions on Health Records Consent. Grando, Maria Adela; Murcko, Anita; Mahankali, Srividya; Saks, Michael; Zent, Michael; Chern, Darwyn; Dye, Christy; Sharp, Richard; Young, Laura; Davis, Patricia; Hiestand, Megan; Hassanzadeh, Neda // Journal of Law, Medicine & Ethics;Summer2017, Vol. 45 Issue 2, p238 

    A main objective of this study is to assess the opinions of 50 behavioral health patients on selective control over their behavioral and physical health information. We explored patients' preferences regarding current consent models, what health information should be shared for care and research...

  • The Role of Law in Supporting Secondary Uses of Electronic Health Information. Ramanathan, Tara; Schmit, Cason; Menon, Akshara; Fox, Chanelle // Journal of Law, Medicine & Ethics;Spring2015 Supplement s1, Vol. 43, p48 

    Law establishes the foundation for the 'secondary use' of electronic health information (EHI) for public health purposes. Federal law, state law, and legal tools, such as contracts and policies, support data exchange between providers, facilities, and public health departments. This article...

  • Identifiable Data Are Not What They Used to Be:. AHC MEDIA // IRB Advisor;Sep2019, Vol. 19 Issue 9, pN.PAG 

    IRBs and researchers should change their old habits when it comes to assessing studies for privacy and confidentiality. Researchers recently showed that de-identified data could be used to find a specific person. Using a mathematical model in databases of more than 200 populations, researchers...

  • Preserving temporal relations in clinical data while maintaining privacy. Hripcsak, George; Mirhaji, Parsa; Low, Alexander F. H.; Malin, Bradley A.; Low, Alexander Fh // Journal of the American Medical Informatics Association;Nov2016, Vol. 23 Issue 6, p1040 

    Objective: Maintaining patient privacy is a challenge in large-scale observational research. To assist in reducing the risk of identifying study subjects through publicly available data, we introduce a method for obscuring date information for clinical events and patient...

  • Working with the rules. Conn, Joseph // Modern Healthcare;9/24/2012, Vol. 42 Issue 39, p14 

    This article reports on the success of the electronic patient-consent management system demonstrated by the U.S. Department of Veterans Affairs and the Department of Health and Human Services (HHS) Substance Abuse and Mental Health Services Administration. The technology will help providers...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics