Access your Pro+ Content below.
HITECH Act increases HIPAA security requirements
This article is part of the Information Security magazine issue of March 2010
The health care industry was buzzing with the news: For the first time ever, a hospital was being audited for compliance with HIPAA security requirements. The audit of Piedmont Hospital in Atlanta by the U.S. Department of Health and Human Services' inspector general in 2007 was surprising for hospitals, health insurers and others in an industry accustomed to a lack of enforcement of federal privacy and security requirements. A year later, HHS took another unusual step, meting out a $100,000 fine to Seattle-based Providence Health & Services for HIPAA security and privacy violations. The organization had lost backup tapes, optical disks and laptops containing unencrypted protected health information on more than 360,000 patients. But those enforcement actions could be small potatoes compared to what's ahead. The Health Information Technology for Economic and Clinical Health (HITECH) Act, part of the American Recovery and Reinvestment Act signed into law last year, earmarks about $19 billion in incentives to encourage adoption of...
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
HIPAA security compliance has been a mixed bag but HITECH ups the ante
Integrating security information management systems with identity management systems ties policy violations and vulnerabilities to user activity
Learn how to develop an effective information security metrics program and pitfalls to avoid.
Knowledge-based authentication helps catch fraud, but the authentication technology poses customer privacy issues.
Columns in this issue
The HITECH Act increases penalties for a lack of HIPAA security compliance but will it really improve health care security?
A successful career in information security requires an effective information security career plan
Organizations must enhance network intrusion detection systems with supporting processes to uncover genuine threats