Who: GovInfoSecurity.com What: The Department of Health and Human Services conducts three types of audits or investigations involving privacy and security issues. But preparing for any of these inquiries requires similar steps. Experts who presented a workshop at the recent 2013 HIMSS Conference say the best way to prepare for any HHS inquiry, based on […]
HIMSS
-
-
Meaningful Use – What you need to know at every stage from HIMSS From GE Healthcare comes this video showing the current roll out of Meaningful Use Stage 1 criteria as well as Stage 2 and Stage 3 projections.
-
According to a white paper from HIMSS Analytics, fewer than a third of US hospitals report having active interfaces between medical devices and their EMR systems, according to FierceEMR blog. And the situation with individual medical practices can’t be much better. Although this might not sound like a big deal to most, the inability to […]
-
In a post on Becker’s Hospital Review, Jaimie Oh presents a list of 11 best practices for maximizing healthcare IT incentive payments. And although the audience is specifically administrators of hospitals, if you are a physician or medical practice administrator there is still much you can take home from the following recommendations: Figure out what […]
-
According to the 2010 HIMSS Security Survey, with responses from 272 healthcare IT and security professionals, hospitals and medical practices are spending more on information technology (IT) security but still spend less on average than companies in other industries. The results of the third annual survey were reported on CMIO.net and included other interesting facts: […]
-
When medical practices change over from paper to electronic medical records (EMR), steps must be taken to ensure that the records remain legally sound. The change to electronic medical records brings up some issues with compliance, privacy, and security. Below you will find some important considerations to make when switching your practice over to EMR. […]