Pulse November 30, 2021
Matt Fisher

An important part of establishing strong security for an organization rests with how it interacts with its vendors. The creation of a chain of entities creating, interacting with, storing, or otherwise handling sensitive patient information starts at the top, but can easily and frequently go down many layers. Given the layered approach, every time an organization introduces a new sublayer that organization must keep security as a forefront consideration. The risks associated with vendors not appropriately deploying security measures can be seen with the increasing number of data breaches resulting from an issue at the vendor level. Given that reality, what should or should not happen at each vendor level?

Do: Incorporate Security Into All Operations

Security cannot happen overnight....

Today's Sponsors

LEK
ZeOmega

Today's Sponsor

LEK

 
Topics: Govt Agencies, Health IT, HIPAA, Provider, Technology
Protecting Health Data Without Harming Patients: Overcoming the Barriers That Limit Our Access to Our Personal Health Information
If data is the new oil, there’s going to be war over it
Epic cuts data access to startup over alleged misuse
Health records giant Epic cracks down on startup for unauthorized sharing of patient data
2023 in Review: The Rise of Healthcare Data Privacy Regulations

Share This Article