
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"Improving Michigan Healthcare IT Security","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"0ZfuRr0CkF\"><a href=\"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/\">Improving Michigan Healthcare IT Security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/embed\/#?secret=0ZfuRr0CkF\" width=\"600\" height=\"338\" title=\"&#8220;Improving Michigan Healthcare IT Security&#8221; &#8212; OTAVA\" data-secret=\"0ZfuRr0CkF\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"In the quest to further secure patient health data with strong access controls, Michigan healthcare providers can now use biometrics to verify patient identity prior to allowing access to their medical record. PatientSecure works by scanning a patient\u2019s palm vein pattern and linking them to their unique medical record.The Michigan Health Information Network Shared Services (MiHIN) announced a partnership with the patient identity management company and developer of PatientSecure, HT Systems, to provide the security system to statewide healthcare providers. This system is interesting because it provides a way for patients to securely access their medical record as they move between healthcare systems and doesn\u2019t require a badge or access code that could be potentially stolen and used for identity theft. Technology is emerging (or at least being implemented more readily) as a response to the data breaches that have recently plagued the healthcare industry in droves &#8211; the HHS Wall of Shame reports over 21 million individuals have been affected by an unsecured data breach dating back to 2009. In 2012, 119 breaches, each affecting over 500 individuals and involving unsecured data have been reported, totaling to over 2 million affected individuals. Michigan healthcare organizations account for 118,000 of...","thumbnail_url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/MiHIN.png"}