privacy

See the following -

HHS, VA Go Granular In Info Exchange Demo

Joseph Conn | ModernHealthcare.com | September 17, 2012

HHS and the U.S. Veterans Affairs Department have demonstrated the successful use of technology to persistently enforce federal patient consent requirements at the "granular" data element level, HHS announced. Read More »

HIE 'Rules Of Road': What's Next?

Marianne Kolbasuk McGee | GovInfoSecurity.com | September 17, 2012

Supporters of a recent decision by federal regulators to back away from issuing voluntary "rules of the road" for secure health information exchange say the move makes sense [...]. But some others argue that establishing HIE benchmarks, especially for privacy and security, is advisable now to help build public trust. Read More »

HIE Critical To Care Continuity In Natural Disasters

Dan Bowman | FierceHealthIT | November 2, 2012

As some hospitals in the New York metropolitan area were forced to evacuate patients and send them to nearby facilities in the wake of Hurricane Sandy, health information exchange proved to be a vital tool in making those transitions as smooth as possible. Read More »

HIEs: Help in Disasters?

Marianne Kolbasuk McGee | Healthcare Info Security | November 2, 2012

How big of a role did health information exchanges play in providing access to records during Superstorm Sandy, and what lessons can be learned? Federal officials will address these questions, says HIE expert Lee Stevens. Read More »

HIMSS Asks Congress For National Data-Matching For HIEs And Harmonized Privacy Regs

Julie Bird | FierceHealthIT | September 24, 2012

Mismatched data puts patient safety at risk, group warns
Read More »

HIMSS EHR Association Fires Back At GOP Senators Calling For MU reboot

Mike Milliard | Government Health IT | May 22, 2013

One month after six Republican Senators published a white paper calling for a new approach to the federal meaningful use incentive program, the HIMSS Electronic Health Record Association has drafted a point-by-point response. Read More »

HIT Vendor Alliance Comments On Lifting Interoperability Barriers

Joseph Goedert | Health Data Management | April 26, 2013

The CommonWell Health Alliance, announced in March and comprising a handful of health information technology vendors collaborating to cooperate on systems interoperability issues, has responded to a federal request for information on ways to advance interoperability and health information exchange. Read More »

Homeland Security Wants to More Than Double Its Predator Drone Fleet Inside The US, Despite Safety And Privacy Concerns

Trevor Timm | Electronic Frontier Foundation | November 20, 2012

Despite renewed criticism from both parties in Congress that domestic drones pose a privacy danger to US citizens—and a report from its own Inspector General recommending to stop buying them—the Department of Homeland Security (DHS) has indicated it wants to more than double its fleet of Predator drones used to fly surveillance missions inside the United States. Read More »

How A Flaw In VA Software Was Found

Marianne Kolbasuk McGee | Data Breach Today | December 11, 2013

Security analyst Doug Mackey says his discovery of a vulnerability in the Department of Veterans Affairs' VistA electronic health record system highlights the importance of software security testing. Read More »

How Accumulo Safeguards Your Civil Liberties

Jeffrey Kelly | Silicon Angle | June 7, 2013

It’s been widely reported that the NSA is in the midst of collecting huge volumes of call metadata from Verizon associated with all domestic and international calls made by the company’s customers for three months [...]. Less attention has been paid to what exactly the government does with all that data or the technology supporting it. Read More »

How Microsoft Handed The NSA Access To Encrypted Messages

Glenn Greenwald, Ewen MacAskill, Laura Poitras, et. al. | The Guardian | July 11, 2013

Microsoft has collaborated closely with US intelligence services to allow users' communications to be intercepted, including helping the National Security Agency to circumvent the company's own encryption, according to top-secret documents [...]. Read More »

How Open Source Communities in India Support Privacy and Software Freedom

The free and open source communities in India, particularly Mozilla and Wikimedia communities, are leading two unique global events for better privacy and in support of free software. January Privacy Month is led by the Mozilla community in India to educate the masses about online privacy via both online and offline outreach events. And, Freedom in Feb is led by the Centre for Internet and Society to educate content producers like bloggers and photographers on how to donate their content under open licenses...

How Snowden's Email Provider Plans To Build An NSA-Proof Communications Tool

Conor Friedersdorf | The Atlantic | November 5, 2013

Ladar Levison intends to offer a product with world-class cryptography and a user interface simple enough for a grandmother to master. Read More »

How The FISA Amendments Act Allows For Warrantless Wiretapping, As Described By Supreme Court Justices

Trevor Timm | Electronic Frontier Foundation | October 30, 2012

On Monday, the Supreme Court heard oral arguments in Clapper v. Amnesty, an important case that will decide if the ACLU’s challenge to the FISA Amendments Act—the law passed in the wake of the NSA warrantless wiretapping scandal—can go forward. Read More »

How the Government's 2013 Tech Policy Agenda Will Impact IT

Kenneth Corbin | CIO | January 14, 2013

From cybersecurity to privacy, mobile broadband to net neutrality, the coming year in Washington promises to be a busy one for the technology sector. Read More »