Healthcare privacy regulations are getting more stringent, and the industry isn't ready.
HEALTHCARE PRIVACY regulations are getting more stringent, and the industry isn't ready. That's the thumbnail version of a new report by the Deloitte Center for Health Solutions.
"It's a major shift in the scope of where the law applies," says Mark Ford, a Deloitte & Touche principal.
THEFT MORE COMMON THAN LOSS
Given the nature of personal information healthcare organizations collect, it's no surprise regulators are working to tighten security. Given the type of information health organizations collect, including Social Security numbers, insurance identification numbers, payment information and medical provider identification numbers, data fraud and identity theft represent huge risks. Indeed, breaches involving theft are four times as frequent as breaches involving loss or unauthorized access, the second and third most frequent types of breaches, according to the Deloitte report.
While organizations need to thoroughly assess security risks and put comprehensive policies and procedures in place, Ford says implementing, communicating and enforcing a handful of simple security measures can make a big dent in the problem. He notes that laptops are by far the most common location for security breaches because these devices are easily lost or stolen. Using an encryption program and implementing and strong security mechanisms can "help protect people from themselves," Ford says.
A more thorough fix requires stakeholders to assess their current preparedness. Many healthcare organizations are inadequately prepared for privacy and security risks because they lack resources, internal control over patient information or upper management support, according to the report. Others rely on outdated policies and procedures, fail to adhere to current policies or inadequately train their employees.
To stay on the right side of HITECH, Deloitte recommends stakeholders identify and assess their data security risks; develop and implement a security and privacy plan; and communicate organizational expectations and conduct employee training. Finally, organizations must verify that they are conforming to their own policy standards.
"Some of these things are fairly tactical in nature," says Deborah Golden, also a principal. "How do you address a security breach? It may be as simple as gaining a better understanding of your vulnerabilities. The key is sustaining that understanding so you're not constantly in a reactive mode so that you're thinking more strategically and have people and a process in place."
-Shelly Reese
Sexual Health and HIV Care Integration Key to Better Care | IAS 2025
July 14th 2025Integrating HIV and sexual health care is essential for improving outcomes, but global stigma, funding cuts—especially the defunding of USAID—and structural barriers like limited access and political resistance continue to hinder progress, experts emphasized at IAS 2025.
Read More
Conversations with Perry and Friends: Saar Mahna, J.D., MBA
July 7th 2025Perry Cohen, Pharm.D., a longtime member of the Managed Healthcare Executive editorial advisory board, is host of the "Conversations with Perry and Friends" podcast. In this episode, Cohen speaks with Saar Mahna, J.D., MBA, CEO and founder of Banjo Health, an artificial intelligence company focused on prior authorization.
Listen
FDA Expands Kerendia’s Use to Treat Common Form of Heart Failure
July 14th 2025Kerendia was originally approved in July 2021 to reduce cardiovascular and kidney complications in patients with chronic kidney disease (CKD) associated with type 2 diabetes. This new approval extends its use to a broader patient population.
Read More
Conversations With Perry and Friends: Paul Fronstin, Ph.D.
May 9th 2025Perry Cohen, Pharm.D., a longtime member of the Managed Healthcare Executive editorial advisory board, is host of the Conversations with Perry and Friends podcast. In this episode, his guest is Paul Fronstin, Ph.D., director of health benefits research at the Employee Benefit Research Institute.
Listen