Readers Speak

June 24, 2011
As a CIO, how concerned are you about security breaches involving personal health information impacting your facility? Extremely concerned. 57.14%
As a CIO, how concerned are you about security breaches involving personal health information impacting your facility?
  • Extremely concerned. 57.14%

  • Moderately concerned. 19.05%

  • Concerned, but to a minor degree. 9.52%

  • Not at all worried. 14.29%

At the beginning of June, ONCHIT (Office of the National Coordinator for Health Information Technology) issued a strategic plan. Among its goals are three broad strategic ones. Which of these three do you think should be the top priority?
  • Make EHRs easy to buy and implement. 37.50%

  • Promote certified IT products as essential to clinical care. 22.50%

  • Initiate the process of sharing data in real-time. 27.50%

  • None of the above. 12.50%

AT&T, Covisint, and Microsoft are launching a nationwide eHealth exchange using Microsoft HealthVault. Will this make your facility more likely to accept data through Microsoft's PHR?
  • Yes. 22.73%

  • Possibly. 18.18%

  • No. 40.91%

  • Not sure yet. 18.18%

Healthcare Informatics 2008 August;25(8):14

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...