Access "Is HITECH Destined to be a Cybercrime Stimulus Act?"
This article is part of the December 2009 issue of Step-by-step guide to avoiding basic database security risks
The Health Information Technology for Economic and Clinical Health (HITECH) Act, part of the American Recovery and Reinvestment Act signed into law by President Obama earlier this year, calls for a $19 billion investment into health care information technology to modernize medical practices with electronic medical records systems (EMRs). The goal is to reduce overall health care costs by luring hospitals and clinicians, which have been slow to adopt EMRs because of their high price and complexity, into this electronic realm with large financial incentives starting in 2011. Any health care provider that has not implemented an EMR by 2016 faces financial penalties through reduced Medicare fees. One of the keys in this bill to reducing the cost of health care is that physicians could exchange patient data electronically; a physician or hospital cannot obtain the government incentives without demonstrating this capability. The idea is that EMR systems would reduce the number of tests performed because data could be shared easily between physicians across the ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Is New Google Chromium OS a Security Game-Changer?
Google says Chromium's process isolation and sandbox security features harden the OS from attack.
-
Carefully evaluate providers' SaaS security model
Enterprises need to make sure a SaaS provider has the proper security controls to protect sensitive data before a contract is signed
-
Is New Google Chromium OS a Security Game-Changer?
-
-
Basic Database Security: Step by Step
by Adrian Lane, Contributor
Use this checklist to ensure you're following the basics for securing database systems.
-
Writing security policies using a taxonomy-based approach
by Ravila Helen White, Contributor
Forget structure-driven policy architecture; we'll show you how to build information security policy artifacts using a taxonomy approach that will help you build global policies in a snap.
-
Basic Database Security: Step by Step
by Adrian Lane, Contributor
-
Columns
-
Is HITECH Destined to be a Cybercrime Stimulus Act?
The HITECH Act, part of the economic stimulus bill, is intended to foster electronic medical records systems adoption, but will also introduce security and privacy risks to patient medical and billing data.
-
Editor's Desk: Apathy and the Cybersecurity Coordinator
Six months since President Obama announced he would appoint a cybersecurity coordinator, the position sits vacant. Do you care?
-
Is HITECH Destined to be a Cybercrime Stimulus Act?
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO