Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Verizon Adds Mobile Security To Healthcare Cloud

Doctors can access electronic health records, digitally sign prescriptions from smartphones and tablets with NIST Level 3 authentication in Verizon's UIS-Healthcare cloud-based service.

17 Leading EHR Vendors
(click image for larger view)
Slideshow: 17 Leading EHR Vendors
Verizon has added healthcare identity standards for accessing electronic health records (EHRs) and health information exchanges, as well as credentials for electronic prescribing and mobile connectivity, to its Verizon Universal Identity Services (UIS)-Healthcare cloud-based service.

UIS-Healthcare provides an identity ecosystem for healthcare professionals seeking to securely access and exchange data over robust networks. Verizon said its new security features are part of the company's strategy to help healthcare delivery organizations mitigate identity theft by enabling secure access to digitized health information. Officials also said customers will pay anywhere from $15 to $25 per user per year for the service, depending on what features they want.

Tracy Hulver, director of product marketing identity solutions, told InformationWeek Healthcare that the healthcare sector is one of the most heavily regulated industries, but many healthcare delivery organizations have limited budgets and fewer dollars to spend on data security and compliance.

Hulver added that because UIS-Healthcare is a cloud-based managed service it "allows healthcare organizations to economically manage their data systems because they are not maintaining the infrastructure and the administrative costs."

The newly added security features are designed to meet the National Institute of Standards and Technology (NIST) Level 3 authentication requirements; NIST is the federal agency that works with industry to develop and apply technology, measurements, and standards. The credentials also meet federal Meaningful Use requirements outlined in the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009.

The enhanced services now deliver legally binding digital signature capabilities, which help physicians digitally sign patient health information--such as treatment plans, electronic prescriptions, laboratory reports, and discharge orders--with user authentication and security protections.

Other documents that can be digitally signed and exchanged include official communications with contractors and business partners and filings to government agencies. With Verizon's new ID Message Center, users can track their digital signature activities through a mobile application or optional Web-based portal.

"By using the ID Message Center, doctors can use UIS to authenticate the user to the healthcare network and then, when they write an e-prescription, be able to authenticate it at the transaction level that that prescription is actually valid," Hulver said.

UIS-Healthcare now allows physicians to log onto the system with their smartphones and tablets running on the widely used Apple iOS, Android, and BlackBerry mobile operating systems to authenticate their identity and access these new capabilities.

Additionally, UIS-Healthcare now supports the code of federal regulations from the U.S. Drug Enforcement Administration (DEA) and the Food and Drug Administration (FDA). Specifically, the new service supports CFR-1311 guidelines from the DEA, which regulates the use of e-prescribing for controlled substances. UIS-Healthcare also supports the FDA's CFR-21 Part 11, which provides digital signature guidelines for the submission of electronic records.

In June, Verizon announced that the service supports the SAFE-BioPharma standard, the only life science digital standard that offers interoperability with government agencies, such as the FDA and the European Medicines Agency.

Find out how health IT leaders are dealing with the industry's pain points, from allowing unfettered patient data access to sharing electronic records. Also in the new, all-digital issue of InformationWeek Healthcare: There needs to be better e-communication between technologists and clinicians. Download the issue now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Active Directory Needs an Update: Here's Why
Raz Rafaeli, CEO and Co-Founder at Secret Double Octopus,  1/16/2020
New Attack Campaigns Suggest Emotet Threat Is Far From Over
Jai Vijayan, Contributing Writer,  1/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5216
PUBLISHED: 2020-01-23
In Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.9.0, 5.2.0, and 6.3.0. If user-supplied input was passed into append/override_content_security_policy_directives, a newline could be injected leading to limited header injection. Upon seei...
CVE-2020-5217
PUBLISHED: 2020-01-23
In Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.8.0, 5.1.0, and 6.2.0. If user-supplied input was passed into append/override_content_security_policy_directives, a semicolon could be injected leading to directive injection. This could b...
CVE-2020-5223
PUBLISHED: 2020-01-23
In PrivateBin versions 1.2.0 before 1.2.2, and 1.3.0 before 1.3.2, a persistent XSS attack is possible. Under certain conditions, a user provided attachment file name can inject HTML leading to a persistent Cross-site scripting (XSS) vulnerability. The vulnerability has been fixed in PrivateBin v1.3...
CVE-2019-20399
PUBLISHED: 2020-01-23
A timing vulnerability in the Scalar::check_overflow function in Parity libsecp256k1-rs before 0.3.1 potentially allows an attacker to leak information via a side-channel attack.
CVE-2020-7915
PUBLISHED: 2020-01-22
An issue was discovered on Eaton 5P 850 devices. The Ubicacion SAI field allows XSS attacks by an administrator.