My Photo

February 2016

Sun Mon Tue Wed Thu Fri Sat
  1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29          

Categories

Categories

Thought Leaders

Blog powered by Typepad
Bookmark and Share

« Cool Ice-powered Air conditioners cut power consumption up to 30% | Main | From body doping to cognitive enhancement --The "anti-stupidity" Pill--Right ? or Wrong ? »

August 06, 2006

Comments

Gordon Atherley

The August 2006 report from Canada’s Mounties describes malware’s shift from distributed destructiveness to targeted fraud. The fraud is growing fast, very fast, in most if not all sectors. Underpinning the fraud is ID abuse in which persons or organizations pose as something or someone they are not.

ID abuse threatens healthcare because it exposes patients not only to fraud, but also to health harm—like lethally incompatible blood transfusions enabled by electronic health records corrupted by ID abuse.

Thanks to effective lobbying, governments in many countries strongly believe that electronic health records are the solution to the enduring challenge of patient safety, among other things. In their enthusiasms, though, they’re playing down or ignoring ID abuse as a major threat to healthcare and the safety of its patients.

Is it time for the IT community to start asking tough questions about the security of electronic health records relative to the ID abuse risk?

The comments to this entry are closed.

AddThis Social Bookmark Button

TypePad Help