Posts Tagged with phi

by adgrooms on March 5, 2020

When you go tent camping, you typically don't have any reason to lock down your tent with a padlock. The possessions generally are lower in value and easily replaceable. The only threat is that bear getting to your peanut butter and honey sandwich, and he can have it. However, in your home, you have valuable items that you want to prevent other people from taking. This is one of the main ...

Read More
by adgrooms on February 11, 2020

In 1994, Jeff Bezos moved Seattle, known at that time for its tech talent and Grunge music. He didn't start a band, but he did start selling books online though his new company Amazon. Now he is arguably one of the biggest rockstars in tech, and he is making a mark in a new genre, healthcare.

The growth of Amazon's business from a bookseller into the largest tech company in the world has ...

Read More
by adgrooms on February 4, 2020

"Hey, Google," "What was my LDL cholesterol from last year's checkup?"

With the inevitable interoperability rules being enacted by HHS agencies, some of us may be asking Google or Alexa questions about information in our personal health records. The new rules will allow patients to give third-party apps access to their PHI. Big tech has been courting healthcare for some time now. Google ...

Read More
by adgrooms on January 30, 2020

In our last post, we looked at the how proposed interoperability rules were getting some pushback. We have also written a post about proposed interoperability rules in the past that are a different set of rules. So, there are two different sets of rules from two different agencies. This prompted some questions for us about the differences. Why two different rules? Will they work together? Who ...

Read More
by adgrooms on January 24, 2020

We have looked at several different perspectives of healthcare data breach information in recent posts. We are close to combining the observations from all of the previous posts into a full report. In the data from HHS that we have been analyzing, some of the breaches are accompanied with a detailed explanation of the cause and corrective action taken. These give more insight into some of the ...

Read More