Magazine Article | February 3, 2012

Is Protecting PHI A Pipe Dream?

Source: Health IT Outcomes

By Mark Kadrich, Author, Endpoint Security

When I was approached to share my thoughts on the subject of PHI (protected health information) security, I first thought of the story about a young man who asked his Chinese great-grandfather what he thought about the French Revolution. The ancient one replied, "we will have to wait and see how it turns out."

That's pretty much how things go in the healthcare industry. Nothing happens quickly because of regulatory controls, certifications, and endless rules. Sure, most of them exist because either someone died or a large number of people were injured, leading to a rule or regulation designed to prevent reoccurrence. For the most part, these controls are there to make our industry better for the people we serve.

access the Magazine Article!

Get unlimited access to:

Trend and Thought Leadership Articles
Case Studies & White Papers
Extensive Product Database
Members-Only Premium Content
Welcome Back! Please Log In to Continue. X

Enter your credentials below to log in. Not yet a member of Health IT Outcomes? Subscribe today.

Subscribe to Health IT Outcomes X

Please enter your email address and create a password to access the full content, Or log in to your account to continue.

or

Subscribe to Health IT Outcomes