Video Screencast Help
Healthcare Online User Group
Showing posts in English
Sarah Muckler | 10 Sep 2012 | 0 comments

David Finn, Symantec's Healthcare IT Officer, shared this article with Symantec's Healthcare Team and I felt it was valuable to pass on.

 

Multi-Factor Authentication Gets a Boost

Advisers Endorse Requirement for HITECH Stage 3

By Marianne Kolbasuk McGee, September 7, 2012.

A federal advisory group has endorsed requiring multi-factor authentication in certain cases for Stage 3 of the HITECH Act electronic health record incentive program.

Stage 3 is slated to begin in 2015, and rules are in the early discussion stages at the Department of Health and Human Services. HHS recently issued final rules for Stage 2, which starts in 2014 (see:...

David Finn | 05 Sep 2012 | 4 comments

To:  HIMSS Emerging Professionals,

Registration is open for the September 14th Emerging Professionals webinar:

Meaningful Mentoring or Mentoring for Fun & Profit (Everybody’s)*

David S. Finn, CISA, CISM, CRISC, Health IT Officer, Symantec

A seriously light-hearted look at what being a mentor is all about.  We’ll learn how mentoring got started, what it means to be one and that there can be different mentors for different needs.

  • Learn and understand what a mentor is:  historically, by definition and in application
  • Recognize there may be different mentors for different needs and how to go about finding one
  • Be familiar with different kinds of mentors, personal & professional

 

Friday, September 14th

12:00 – 1:00 PM Central

 

...

Sarah Muckler | 20 Aug 2012 | 0 comments

MOUNTAIN VIEW, CA--(Marketwire -08/15/12)- Symantec Corp. (SYMC) today announced that the Gynecological Oncology Group's Statistical and Data Center (GOG SDC), one of the National Cancer Institute's (NCI) funded cooperative cancer research groups, now has 30 times more backup capacity efficiency and combined protection across physical and virtual environments. Symantec Backup Exec 2012's new user interface lets GOG SDC easily set up and configure backups across physical and virtual machines, deduplicate the backups, and convert physical server backups to VMware or Hyper-V virtual machines for instant recovery.

Click to Tweet: Cancer research group GOG SDC modernizes #vmware backup & recovery with @Symantec's @BackupExec 2012: http://bit.ly/NvOhnT

"The newest version of Backup Exec delivers confidence in our mixed physical and virtual environment. We can restore data to either platform, and the...

Sarah Muckler | 03 Aug 2012 | 0 comments

Today's healthcare organizations face many challenges as they meet the broad range of changes and regulations that apply to healthcare stakeholders. This list includes expanding connectivity and information exchange, automating electronic medical record systems, delivering quality around-the-clock patient care, as well as securing Protected Health Information (ePHI). To meet these challenges, healthcare organizations depend on the ability to deploy agile and efficient IT infrastructure. Mission-critical applications must serve the vital and specific needs of patient care, while timely adoption of new technologies such as virtualization and cloud become more important to protecting the bottom line. With tightening IT budgets and more government mandates on Healthcare IT, many organizations face challenging and difficult choices for deploying their mission-critical applications. A completely consolidated single-vendor hardware and software stack can offer comfort for some, at the...

David Finn | 17 Jul 2012 | 0 comments

Well, most of you have heard me, for several years now, talking about the impact of HIPAA on banking and Financial Institutions.  I remember as a hospital CIO getting all this stuff from the Medical Banking Project and wondering what it had to do with me - - I used to send it on the revenue cycle people, who in turn, I'm sure, wondered what it had to do with them . . .  That was probably the early 2000’s.  Now we know.

Today’s healthcare providers must continue to diligently require business associate contracts from their financial institution partners when there is access, use or disclosure of personal health information (PHI).  This happens in cash management with lockbox arrangements, with EDI operations and in other areas.  Here’s an example:  when a bank’s lockbox is used to gather, collect and streamline payments and it includes processing the Explanation of Benefits (EOBs), this will result...

David Finn | 28 Jun 2012 | 0 comments

   The Supreme Court has spoken, but the debate will probably not end. This morning, the Supreme Court held that the Patient Protection and Affordable Care Act (ACA) is constitutional. Healthcare will, however, be a key issue in the presidential election.

   Some of you may remember the discussion of this case on a recent Healthcare Community Call.  There were 4 key issues the Court was to consider:

  1. Anti-Injunction Act
  2. The Individual Mandate
  3. Severability
  4. Medicaid Expansion

  In a nutshell, the Individual Mandate was upheld.  Not under the commerce clause as the Administration argued, but upheld constitutionally under the broad taxing powers of the Congress.  That, then, essentially addresses the anti-injunction act by saying it is a tax and not a penalty.

Severability is not an issue since the law was upheld.  There is no need to pull out or sever pieces of the law from...

David Finn | 18 Jun 2012 | 0 comments

What makes the healthcare industry such a hot target for hackers? The answer lies in the records that they keep. Medical records contain some of the most valuable personal information — social security numbers, birth and death dates, family information, billing information including credit card data — that allow hackers to gain full reign on a person’s identity and do some major damage. Just like any other business, even in hacking it boils down to the bottom line, and hackers want the most payout for their efforts. Healthcare organizations are the latest gold mine.

Yet, so many organizations are doing a poor job of protecting patient data. According to the Identity Theft Resource Center 2011 Breach Stats Report, 20 percent of all data breaches reported in 2011 were in the healthcare industry; the Privacy Rights Clearinghouse pegged this number at 33 percent in 2011. So, anywhere from one-fifth to one-third of data breaches last year were at...

David Finn | 03 Apr 2012 | 0 comments

At the Jefferson Memorial you find a lot of Jefferson’s writings - - as opposed to Lincoln’s, for example (one thing that makes sense in Washington, DC).  One of them says this:  “I am not an advocate for frequent changes in laws and constitutions, but laws and institutions must go hand in hand with the progress of the human mind.” 

One of my very first IT assignments was to write the coding standards for a major university - - we did all our own development at that time and were about to completely re-do all major systems (billing, collections, records and registration, scheduling, grading - - everything).  My writing experience had previously been journalistic or for the theatre.  So, I started asking people who had more experience.  First stop was a very senior manager who pointed to two shelves full of three inch, three ring binders on his bookshelf.  “Here’s a good example,” he said, “of...

David Finn | 26 Mar 2012 | 0 comments

Dear All:

   I have just submitted the following to the ONC website as part of their solicitation regarding input on ways to secure health data on Mobile Devices.  http://www.ihealthbeat.org/articles/2012/3/7/onc-seeking-input-on-ways-to-secure-health-data-on-mobile-devices.aspx

***************************************************************************************************

 David Finn, CISA, CISM, CRISC

Health IT Officer, Symantec Corp.

(Former Healthcare CIO)

In my experience, caregivers are among the most creative users of technology around.  They will figure out what they need to do in order to provide care to a patient and get their job done - - and in the end are much smarter than PCs, phones, jump drives or even medical devices.  Mobile solutions, because...

Sarah Muckler | 22 Mar 2012 | 0 comments

MU Live! is a 30 minute internet talk radio show hosted by HITECH Answers. The next show we focus on Security Risk Analysis to meeting meaningful use.

Register below to receive notification on how to participate and listen in.

March 27, 2 pm Eastern: The guest this week is David Finn, Health IT officer at Symantec and former CIO of Texas Children’s Hospital.  David also served as a Director for HIMSS from 2008-2011. He is going to discuss the Security Risk Analysis required to meet meaningful use.

 

http://www.hitechanswers.net/mu-live-is-back-for-2012/