Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Healthcare Online User Group
Showing posts in English
David Finn | 28 Jun 2012 | 0 comments

   The Supreme Court has spoken, but the debate will probably not end. This morning, the Supreme Court held that the Patient Protection and Affordable Care Act (ACA) is constitutional. Healthcare will, however, be a key issue in the presidential election.

   Some of you may remember the discussion of this case on a recent Healthcare Community Call.  There were 4 key issues the Court was to consider:

  1. Anti-Injunction Act
  2. The Individual Mandate
  3. Severability
  4. Medicaid Expansion

  In a nutshell, the Individual Mandate was upheld.  Not under the commerce clause as the Administration argued, but upheld constitutionally under the broad taxing powers of the Congress.  That, then, essentially addresses the anti-injunction act by saying it is a tax and not a penalty.

Severability is not an issue since the law was upheld.  There is no need to pull out or sever pieces of the law from...

David Finn | 18 Jun 2012 | 0 comments

What makes the healthcare industry such a hot target for hackers? The answer lies in the records that they keep. Medical records contain some of the most valuable personal information — social security numbers, birth and death dates, family information, billing information including credit card data — that allow hackers to gain full reign on a person’s identity and do some major damage. Just like any other business, even in hacking it boils down to the bottom line, and hackers want the most payout for their efforts. Healthcare organizations are the latest gold mine.

Yet, so many organizations are doing a poor job of protecting patient data. According to the Identity Theft Resource Center 2011 Breach Stats Report, 20 percent of all data breaches reported in 2011 were in the healthcare industry; the Privacy Rights Clearinghouse pegged this number at 33 percent in 2011. So, anywhere from one-fifth to one-third of data breaches last year were at...

David Finn | 03 Apr 2012 | 0 comments

At the Jefferson Memorial you find a lot of Jefferson’s writings - - as opposed to Lincoln’s, for example (one thing that makes sense in Washington, DC).  One of them says this:  “I am not an advocate for frequent changes in laws and constitutions, but laws and institutions must go hand in hand with the progress of the human mind.” 

One of my very first IT assignments was to write the coding standards for a major university - - we did all our own development at that time and were about to completely re-do all major systems (billing, collections, records and registration, scheduling, grading - - everything).  My writing experience had previously been journalistic or for the theatre.  So, I started asking people who had more experience.  First stop was a very senior manager who pointed to two shelves full of three inch, three ring binders on his bookshelf.  “Here’s a good example,” he said, “of...

David Finn | 26 Mar 2012 | 0 comments

Dear All:

   I have just submitted the following to the ONC website as part of their solicitation regarding input on ways to secure health data on Mobile Devices.


 David Finn, CISA, CISM, CRISC

Health IT Officer, Symantec Corp.

(Former Healthcare CIO)

In my experience, caregivers are among the most creative users of technology around.  They will figure out what they need to do in order to provide care to a patient and get their job done - - and in the end are much smarter than PCs, phones, jump drives or even medical devices.  Mobile solutions, because...

Sarah Muckler | 22 Mar 2012 | 0 comments

MU Live! is a 30 minute internet talk radio show hosted by HITECH Answers. The next show we focus on Security Risk Analysis to meeting meaningful use.

Register below to receive notification on how to participate and listen in.

March 27, 2 pm Eastern: The guest this week is David Finn, Health IT officer at Symantec and former CIO of Texas Children’s Hospital.  David also served as a Director for HIMSS from 2008-2011. He is going to discuss the Security Risk Analysis required to meet meaningful use.

Sarah Muckler | 19 Mar 2012 | 0 comments

Experiment Reveals Smart Phone Risks

'Lost' Phones Illustrate the Vulnerabilities

Symantec recently conducted a clever experiment designed to illustrate the security risks involved in using smart phones. The security firm, working in collaboration with Security Perspectives Inc., intentionally "lost" 50 smart phones at various public places in five cities. The devices were loaded with simulated corporate and personal data. And Symantec had the ability to remotely monitor what happened to each device once it was found.

Click below to see the full article:


Sarah Muckler | 15 Mar 2012 | 2 comments

Costa Mesa, Calif. and Mountain View, Calif., March 14, 2012 – Experian® and Symantec Corp. (NASDAQ: SYMC) today announced that the two-factor credentialing solution jointly developed by the companies was selected by the Centers for Medicare & Medicaid Services (CMS) to provide Enterprise Remote Identity Proofing (ERIP) and Multi-Factor Authentication (MFA) Credential Services.  The Experian and Symantec solution will play a critical role in a $78 million contract that was awarded to Science Applications International Corporation (SAIC) delivering  an offering  that will support CMS in providing this enterprise service.

As part of CMS' multiple Federated identity proofing methods, the Experian and Symantec solution combines Experian’s identity proofing capabilities with the strong authentication capabilities of Symantec’s Validation and ID Protection (VIP) Service to address the key challenges that arise in identity...

Sarah Muckler | 12 Mar 2012 | 0 comments

Healthcare today faces some of the greatest challenges for IT including increased regulatory pressures, strong security requirements across the most diverse and mission-critical applications and systems, and exponential storage growth.  To further complicate this, healthcare organizations must face these challenges with smaller budgets and fewer resources. is the optimal means to address these issues within healthcare and enables healthcare organizations to leverage one of the largest security infrastructures in the world while controlling costs. is the world’s leading provider of hosted service for securing and managing information stored on endpoints and delivered via email, Web, and Instant Messaging. Over 32,000 organizations and 10.9 million end-users in over 102 countries now enjoy services protection from spam, phishing, inappropriate web use, spyware and other threats. Processing billions of email...

David Finn | 22 Jan 2012 | 0 comments

Well, this is the time of year when everyone involved in health information technology, directly and indirectly, from the providers, payers, government, banking, venture capitalists and vendors begin to turn their attention to HIMSS.  This year HIMSS is in Las Vegas - -  after a long absence from this venue.  For many years, Vegas didn’t have the classroom capacity required but that has changed and HIMSS will be making a return engagement in February.  First, remember we’re on a new schedule this year Monday through Friday (February 20 – February 24).

If you haven’t booked rooms or travel, get on it!  If you haven’t registered better get that done, too.  And then start working on your “dance card”.  The days fill up fast and five days at CHIME & HIMSS disappears very quickly.  And that is just educational sessions, booth visits and professional association meetings or Symposia.  Don...

Axel Wirth | 02 Dec 2011 | 0 comments

Ten years ago when we were all still using flip phones, the mobile revolution we’re now experiencing was just a pipe dream for a few forward-thinking individuals. However, the mobile movement is now upon us, and there is no looking back. If there is any doubt of this, consider that according to Gartner, sales of smartphones will exceed 461 million this year – surpassing PC shipments in the process – and rise to 645 million in 2012.

As a result, the paradigm is actually shifting from traditional computing being adapted to mobile devices to mobile computing being adapted to traditional endpoints. For example, early glimpses at Microsoft’s upcoming Windows 8 operating system indicate that the new software will feature the Metro user interface. Where did we first see Metro? It wasn’t on a PC; it was on Windows Phone 7.

If anything is apparent here, it is that the mobility trend is penetrating deep into our lives and as a result has gained a...