A recently released presidential council report, while raising important issues, oversimplifies the challenges involved in securely exchanging health information, says Joyce Sensmeier, vice president for informatics at the Healthcare Information and Management Systems Society
It's not enough to recover data after an incident; also essential is restoring the software needed to read the data, as Federal Emergency Management Agency has learned. The inspector general explains it all.
"We cannot allow security breaches to undermine our trust in the U.S. economy," says Sen. Robert Menendez, the New Jersey Democrat who says he'll introduce the bill. "We must step forward and curb these attacks without delay."
Office of Management and Budget Director Jacob Lew issues a directive to require 5.7 million federal employees and contractors to use personal identity verification credentials to access federal IT systems and facilities by Oct. 1.
The successor to David Blumenthal, M.D., who has announced he'll resign as National Coordinator for Health Information Technology this spring, will have a lot of work to do when it comes to protecting the privacy and security of healthcare information.
DHS's inspector general expresses a few reservations about the department's enterprise-wide security program and practices for its top secret/sensitive compartmented information intelligence system, but generally called the management of the system effective.