The American Enterprise Institute, a Washington-based think tank, recently hosted an event to explore regulatory threats to mobile health technologies.Here are six points to consider regarding the government's role in regulating medical apps and other forms of mobile health IT. MORE

Get the PhysBizTech weekly email newsletter. Subscribe today!


  • News
  • How-To
  • Resources
  • Blogs
  • Press Releases
Narrow by Topic:
Provoking providers to Direct exchange new prerogative in select states June 21, 2012 | Mary Mosquera - Contributing Editor
Physicians and hospitals can disclose health information electronically and securely with recipients they know now that 27 states and Guam have gone live with simple directed exchange.
ONC takes hands-on approach to testing mobile device security June 14, 2012 | Mary Mosquera - Contributing Editor
More than 80 percent of physicians use smartphones or tablet devices – yet very few safeguard them against unauthorized access to stored information. The Office of the National Coordinator for Health IT wants to help by teaching providers how to shore up mobile device security.
Experts relay forecasts for SCOTUS outcome June 13, 2012 | Diana Manos
More and more policymakers, healthcare experts and stakeholders are becoming vocal about their predictions regarding the outcome for the Supreme Court's decision on the Affordable Care Act expected by the end of this month.
A new level of transparency is poised to dominate healthcare payment practices, prompting physicians to reevaluate the nature of their financial ties with the life sciences industry according to a recent report conducted by Forbes Insights for Deloitte Touche Tohmatsu Limited.
HIPAA remains in play as technology outpaces privacy protections June 08, 2012 | Diana Manos - Senior Editor
Experts assembled on June 6 in Washington for a panel discussion on electronic medical records and privacy noted that HIPAA provides only a minimum standard for safeguards, not a template for best practices.
Online resource debuts covering federal and state healthcare laws May 24, 2012 | Erin McCann - Contributing Writer
Health Information and the Law, a new website developed by researchers at George Washington University's Hirsh Health Law and Policy Program, launched May 23 with a focus on federal and state laws pertaining to health information.
Do you know the 5 main points of unauthorized entry to your mobile device? May 23, 2012 | Tom Sullivan - Government Health IT
A bulletin circulated by the U.S. Department of Homeland Security this week explained that wireless medical devices (MDs) carry significant security risks. Part of the problem is that the Food and Drug Administration cannot regulate who uses MDs or how they are used – including, most notably, how they're connected to networks.
Handbook offers health IT privacy and security best practices May 09, 2012 | Mary Mosquera - Contributing Editor
A new handbook published by the Office of the National Coordinator for Health IT covers the importance of privacy and security in the use of EHRs and how to conduct best practices to safeguard health information.


Tips on 3 big medical practice transitions June 26, 2012 | Madelyn Young - Content Writer, CareCloud
Three of the toughest transitions doctors and administrators face are physician retirement, office relocation and practice acquisition. As healthcare professionals navigate these big shifts, they sometimes overlook or neglect important aspects of their operations. Adhere to the following advice to avoid common pitfalls.
Navigating insurance and risk management for your medical practice June 12, 2012 | John P. O'Connor - Vice President, Small Commercial, Travelers
Doctors, dentists, ophthalmologists, optometrists, podiatrists or any other medical practitioner must have the right insurance coverage. If the practice is underinsured and a loss occurs, it could be difficult or impossible to stay in business.
How to reduce the risks of cloud computing May 31, 2012 | Michelle McNickle - New Media Producer
Security issues may be one of the final barriers to engaging in cloud computing, according to Rick Kam, president and co-founder of ID Experts, who outlined six tips for mitigating your cloud computing risks.
What you should know about data encryption May 15, 2012 | Michelle McNickle - New Media Producer
A new report acknowledges that misconceptions about data encryption persist – even among people who are generally knowledgeable about computers. The report outlines what you should know about data encryption by debunking seven common myths.
What to study before purchasing cyber insurance May 14, 2012 | Michelle McNickle - New Media Producer
There's no denying that data breaches pose an increasing threat to healthcare entities of all sizes. That's why current risk-management strategy calls for consideration of cyber insurance, according to a recently released report.
Cloud-related PHI security holes – and what to do about them May 02, 2012 | Rick Kam, CIPP - President and Co-founder, ID Experts
For all of its benefits, cloud computing poses very real dangers to covered entities responsible for safeguarding protected health information.
Worried about an OCR audit? Check these 3 areas April 25, 2012 | Michelle McNickle - New Media Producer
The Office of Civil Rights (OCR) is in the midst of a pilot program through which it is performing spot-check audits of HIPAA covered entities for privacy/security and breach-notification compliance. Here are three “hot buttons” that could trigger an OCR audit.
5 ways to prevent a health data breach April 02, 2012 | Geoff Webb
Although breaches at large healthcare providers tend to grab the most headlines, even smaller practices need to be on guard to prevent malicious attackers or simple human error from exposing their protected information.


The Meaningful Use objectives in the HITECH Act are creating new urgency for hospitals and other healthcare provider organizations to implement EHR and CPOE systems. This white paper outlines three key steps that your organization can take to accelerate EHR and CPOE adoption. Read on to discover out how the combination of desktop virtualization and single sign-on make it faster and easier to deploy new clinical applications while optimizing the clinician experience, protecting patient data, and reducing cost and complexity.
The move from paper-based medical records systems to electronic medical records (EMR) technology is improving patient outcomes, increasing clinician productivity, and lowering costs. However, access to patient information must not only be secure, but also fast, convenient and reliable. Technologies that provide security but frustrate clinicians will slow EMR adoption to a crawl. In this white paper, you’ll learn how you can solve this “last mile” problem and maximize user adoption by providing fast, convenient, secure access to EMR data across multiple clients, where and when the clinician requests it.
Who owns protected health information? June 25, 2012 | Jeff Rowe - Contributing Editor
Given all the attention being paid to PHI, you’d think we would already have answered some of the basic questions, beginning with who actually owns it.
EHRs and patient access: 'My body, my record' or 'The doctor knows best'? June 22, 2012 | Arjen Westerink - Director of Business Development, VitalHealth Software
Physicians and patients must find a balance between patient access rights to personal health data and physicians’ rights to create the definitive medical record and keep certain information private.
New privacy and security how-to for physicians is a must-have June 19, 2012 | Mac McMillan - Privacy and Security
Finally, a resource created just for the physician’s practice: The Office of the National Coordinator for Health Information Technology has released its Guide to Privacy and Security of Health Information for eligible providers.
BYOD: The elephant in the room June 12, 2012 | David Lee Scher, MD
Healthcare, because of regulatory issues including HIPAA as well as patient safety concerns, presents unique challenges in regard to BYOD.
The Federation of State Medical Boards has released Model Policy Guidelines for the Appropriate Use of Social Media and Social Networking in Medical Practice.
The OCR audit documentation request list May 03, 2012 | Mac McMillan - Privacy and Security
This request for documentation is important because, not only does it inform the audit team about your programs, but it also informs their audit plans for you.
mHIMSS hosts Virtual Forum on mHealth today April 26, 2012 | Eric Wicklund - Senior Editor
Organizers say they’re nearing 1,000 registered attendees for today's mHIMSS Virtual Forum, titled “The Future of Mobile Technologies and mHealth: Staying Securely Connected.”
What’s in your ideal EHR? April 20, 2012 | Jeff Rowe - Contributing Editor
Having highlighted the critique of a doctor who thinks EHRs should be taking their lead from cutting-edge Internet technology, it seems appropriate to point to another EHR observer who comes at the issue from a different angle.


LifeMed ID, a “Health Security Smart Card” software company providing patient identity management solutions and medical record connectivity across entire provider systems and disparate groups, has deployed its SecureReg™ software at Resolute Health in New Braunfels, Texas. The Resolute Health BeneFIT card will be issued at the Resolute Health Center for Wellbeing and the Resolute Health Family Urgent Care Center.
Phoenix Cardiac Surgery, P.C., of Phoenix and Prescott, Arizona, has agreed to pay the U.S. Department of Health and Human Services (HHS) a $100,000 settlement and take corrective action to implement policies and procedures to safeguard the protected health information of its patients.
FairWarning, Inc., the inventor and world’s leading supplier of privacy breach detection solutions for Electronic Health Records (EHRs), today announced that CoxHealth has selected FairWarning® to conduct proactive privacy auditing for Cerner Millennium as well as other healthcare applications across their enterprise