[ Monday, December 28, 2009 ]
With HITECH adding new emphasis on HIPAA, particularly security issues that can prevent a data breach (or at least the reporting requirements), many covered entities are re-thinking their need to encrypt PHI. That's now a very good idea, even if it's costly or a hassle. But you should also revisit your authentication protocols. You've obviously got usernames and passwords, but is that enough? Perhaps not. Here's an interesting article
on different types of secondary authentication methods, some of which sound very easy and pretty cool.
Jeff [10:20 AM]
Blogger: HIPAA Blog - Edit your Template