Training

Developing an Effective Security Strategy for Health Data

Developing an Effective Security Strategy for Health Data
Regulations such as HIPAA and HITECH drive healthcare providers and payers to adopt information protection strategies. But adoption of consumer-facing electronic privacy is a mixed bag.

Join us to discuss some of the elements that make a good security strategy for the dissemination of health information, including:

  • Key regulations and their impact on how to secure and disseminate data;
  • What is required to enable protection of sensitive health information, including key patient requirements;
  • How to augment a low-profile portal with pro-active communication with patients - and save money.

Background

The HITECH Act is a terrific step forward in enabling hospitals and physicians as well as the healthcare industry at large to implement electronic health records. Yet most approaches result in poor adoption because they fail to take into account the latest consumer trends in how patients wish to consume information - information which must be protected and only disseminated in a secure fashion. By drawing on examples from the financial services industry where information for consumers has successfully transitioned from passive portals, to secure messages and mobile applications, we will explore some examples such as electronic explanation of benefits (EoBs) where securely pushing information to patients can enable dramatic cost savings.

In this session, participants will learn about:

  • Key consumer-patient trends as they relate to consumption of information;
  • Common techniques for securing information that needs to be sent to patients;
  • How to augment the relative poor performance of passive portal-based approaches to sharing information;
  • Leveraging the success of secure consumer communication from the financial services industry;
  • How to dramatically save costs associated with business processes such as Explanation of Benefits.

Webinar Registration

This webinar is available OnDemand.

View Now


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.