- The nightmare of managing liability in identity theft cases was spelled out during a late session of WTN Media's Digital Healthcare Conference, and healthcare providers got a real sense of what a sleepless period it would be.
Using a hypothetical case of identity theft from an orthopedic hospital, attorneys from Michael Best & Fried......
Full article >>>
the laptop immediately notified the hospital of both the theft and the security breach, but in its anxiety to find the perpetrator and recover the compromised records, the hospital did not notify affected patients for more than three weeks after the theft. Not long afterward, patients began to report incidents of possible identity theft; credit cards were opened in their names, and collectors were......Full article >>>
n by instituting policies and safeguards, thoroughly training workers in its comprehensive record retention policies, immediately conducting an internal investigation, hiring an auditor to check HIPAA compliance, and notifying patients after efforts to catch the perpetrator failed.
What would be unreasonable, Thomure said, was for his clients to have no policies or procedures, no training......Full article >>>
ch is what HIPAA is designed to protect. She said real damage would occur if a person who is HIV positive or has a sexually transmitted disease had personal medical records fall into the hands of an employer. If the strictest standard is imposed for financial losses, Granger said the cost of healthcare would rise again. "This is not the right case to allow that to happen," she stated.......Full article >>>
Source:wistechnology.com By Joe Vanden Plas 05/09/06Related biology technology :1
. Managing SOX in the age of SOA2
. Open source software -- Managing the legal risks3
. Enrons dilemma: A corporate governance nightmare4
. Proactive nightmares5
. Browser-based attacks may pose next big IT security nightmare6
. Wisconsin identity theft law: A cheap plastic sword7
. Cracking down on identity theft8
. Credit unions face identity management issues9
. Does your company have an identity crisis?10
. Phishing and pharming: Is your personal identity being harvested?11
. Fake e-mails and Web sites harvest your identity