Evaluating technical tools and services as an exercise in trust

People often seek tools and technology services to help protect security and privacy of information, but when evaluating such technical tools, it can be equally important to consider the source of the tool to determine whether…

Lots of health data breaches reported to HHS, only trivial ones to FTC

With just over a year having passed since the health data breach notification rules mandated by the Health Information Technology for Economic and Clinical Health (HITECH) Act went into effect, and interesting contrast has emerged between…

Rules still pending on privacy and security requirements for PHRs

The Office of the National Coordinator for Health Information Technology (ONC) within the Department of Health and Human Services (HHS) has announced plans for a public roundtable discussion on personal health records (PHRs) to be held…

NCHICA offers recommendations to health care providers on security and meaningful use

The North Carolina Healthcare Information and Communications Alliance (NCHICA) just released a white paper entitled “Privacy and Security Implications of Meaningful Use for Health Care Providers” that reflects the results not only of an analysis of…

Six weeks away from Cyberscope deadline, many agencies remain unclear on requirements

Nearly a year ago, the federal government announced its new Cyberscope online application for reporting agency information associated with the Federal Information Security Management Act (FISMA). In more detailed subsequent guidance issued in April through Memorandum…

Anakam aquisition creates potential for online ID proofing and authentication

Credit reporting services giant Equifax announced yesterday that it has completed an acquisition of privately-held security software company Anakam, whose identity management and strong authentication technologies will presumably enhance Equifax’s solution set in the identity space,…