Richard Pizzi of Healthcare IT News reports: Perlegen Sciences, Inc., a company exploring the clinical application of genetic research, plans to collaborate with an undisclosed electronic medical records vendor to identify and develop genetic markers that predict how patients are likely to respond to specific medical treatments. Under the terms of the agreement, Perlegen, based…
Social media the answer to pushing PHRs, experts say
Diana Manos writes on Health IT News: If the federal government wants to get the word out on using personal health records, it should strongly consider social media. Promoting PHRs will take a whole host of online and other technological multimedia strategies, experts told the consumer empowerment workgroup of the American Health Information Community Tuesday….
Medical notes sent to Buckingham Palace
Seen at EveningStar 24: AN NHS worker in Norfolk has become embroiled in a serious security breach after sending a patient’s medical records to Buckingham Palace by mistake. Highly confidential information was sent to the royal residence after the female member of staff typed in the wrong email address instead of sending it to a…
Former patient charged in computer theft from Indianapolis VA center
In an update to the arrest involving a computer stolen from the Roudebush VA Center, Jaikumar Vijayan of Computerworld reports that the man arrested is a former patient of that VA center.
PA: ID thief sentenced to county prison
Michael P. Rellahan writes on DailyLocal.com: A Chester County judge on Tuesday “reluctantly†agreed to sentence a former Chester County Hospital employee to a term in county prison for stealing the identities of dozens of former patients and using them to order items over the Internet. Judge James P. MacElree II peppered the prosecutor and…
Vendor identifies top five healthcare data security risks
Molly Merrill writes in Healthcare IT News that Absolute Software Corporation, a security software solutions vendor, has identified the top five data security risks most often faced by healthcare facilities. The five risks are: 1. Failure to protect sensitive data beyond encryption. 2. Inability to accurately manage mobile computer assets. 3. Sensitive information on public…