Video: Every Case Tells a Story| Webinar: ACR/CHEST ILD Guidelines in Practice

An official publication of the ACR and the ARP serving rheumatologists and rheumatology professionals

  • Conditions
    • Axial Spondyloarthritis
    • Gout and Crystalline Arthritis
    • Myositis
    • Osteoarthritis and Bone Disorders
    • Pain Syndromes
    • Pediatric Conditions
    • Psoriatic Arthritis
    • Rheumatoid Arthritis
    • Sjögren’s Disease
    • Systemic Lupus Erythematosus
    • Systemic Sclerosis
    • Vasculitis
    • Other Rheumatic Conditions
  • FocusRheum
    • ANCA-Associated Vasculitis
    • Axial Spondyloarthritis
    • Gout
    • Psoriatic Arthritis
    • Rheumatoid Arthritis
    • Systemic Lupus Erythematosus
  • Guidance
    • Clinical Criteria/Guidelines
    • Ethics
    • Legal Updates
    • Legislation & Advocacy
    • Meeting Reports
      • ACR Convergence
      • Other ACR meetings
      • EULAR/Other
    • Research Rheum
  • Drug Updates
    • Analgesics
    • Biologics/DMARDs
  • Practice Support
    • Billing/Coding
    • EMRs
    • Facility
    • Insurance
    • QA/QI
    • Technology
    • Workforce
  • Opinion
    • Patient Perspective
    • Profiles
    • Rheuminations
      • Video
    • Speak Out Rheum
  • Career
    • ACR ExamRheum
    • Awards
    • Career Development
  • ACR
    • ACR Home
    • ACR Convergence
    • ACR Guidelines
    • Journals
      • ACR Open Rheumatology
      • Arthritis & Rheumatology
      • Arthritis Care & Research
    • From the College
    • Events/CME
    • President’s Perspective
  • Search

Rheuminations: New Rules for Rheumatologists

Simon M. Helfgott, MD  |  Issue: April 2013  |  April 1, 2013

It seems to me that hospital information technology departments are conflating password security with file encryption. Computer encryption is very important because, without this feature, lost or stolen laptops or other mobile devices become highly vulnerable portals of entry into a network. In terms of network safety, encryption is a totally separate issue from the ill-conceived policy mandating new passwords every 2,000 hours. New passwords don’t enhance safety. They just give the false impression that they do, similar to the futility of frisking elderly, wheelchair-bound airline passengers waiting to board their planes. I decided to seek the opinions about password safety from my hospital’s two chief information officers. Neither has responded to my e-mail queries. Was this a deliberate act of avoidance or did they not receive my e-mails in the first place? Maybe I ought to send them each a fax.


Dr. Helfgott is physician editor of The Rheumatologist and associate professor of medicine in the division of rheumatology, immunology, and allergy at Harvard Medical School in Boston.

ad goes here:advert-1
ADVERTISEMENT
SCROLL TO CONTINUE

References

  1. Maher B. New Rules for the New Year. New York Times, January 6, 2013; p. SR5. Available at www.nytimes.com/2013/01/06/opinion/sunday/new-rules-for-the-new-year.html?_r=0. Accessed March 13, 2013.
  2. Brill S. Bitter Pill: Why medical bills are killing us. Time Magazine, March 4, 2013. http://healthland.time.com/2013/02/20/bitter-pill-why-medical-bills-are-killing-us. Accessed March 13, 2013.
  3. Rosenthal JA, Lu X, Cram P. Availability of consumer prices from US hospitals for a common surgical procedure. JAMA Intern Med. 2013; Feb 11. [Epub ahead of print]
  4. Herman B. CEO compensation of the 25 top-grossing non-profit hospitals. Becker’s Hospital Review. September 26, 2012. Available at www.beckershospitalreview.com/compensation-issues/ceo-compensation-of-the-25-top-grossing-non-profit-hospitals/print.html. Accessed March 13, 2013.
  5. Song Z, Ayanian JZ, Wallace J, et al. Unintended consequences of eliminating Medicare payments for consultations. JAMA Intern Med. 2013;173:15-21.
  6. Fackler M. In Japan, the fax machine is anything but a relic. New York Times. Feb. 14, 2013; p. A1. Available at www.nytimes.com/2013/02/14/world/asia/in-japan-the-fax-machine-is-anything-but-a-relic.html. Accessed March 13, 2013.
  7. Florencio D, Herley C. Where do security policies come from? Symposium on Usable Privacy and Security (SOUPS) 2010. July 14–16, 2010, Redmond, WA. Available at http://research.microsoft.com/pubs/132623/WhereDoSecurityPoliciesComeFrom.pdf. Accessed March 13, 2013.

Page: 1 2 3 4 5 | Single Page
Share: 

Filed under:OpinionPractice SupportRheuminationsSpeak Out Rheum Tagged with:costsPractice Managementsalaries

Related Articles

    Tips to Access Journals Online

    June 1, 2008

    Online access to Arthritis & Rheumatism and Arthritis Care & Research is a member benefit of the ACR and the ARHP. In order to use this benefit, you must activate your online access by creating a login specifically for the journals through a one-time registration process. Here is a Q&A to help you access journals online.

    Rheumatologists Saw a Gain in Compensation in 2020

    September 22, 2021

    Although patient volume temporarily declined due to the COVID-19 pandemic, rheumatologists saw a larger increase in compensation in 2020 than in 2019, according to a recent Medscape survey.

    Uneven Access & Privacy Issues Hamper Electronic Patient Healthcare Information Sharing

    May 5, 2020

    (Reuters Health)—Patient portals at U.S. hospitals leave a lot to be desired in terms of privacy when individuals want to share access with an informal caregiver, a new study finds. At nearly half of 102 hospitals included in the study, personnel advised that patients share their account password to give access to a family member…

    Generic-Drug Price Fixing: Is It Happening?

    May 17, 2018

    It started with an inhaler. Like many of you, I am a rheuma­tologist. And like you, I see some patients more often their own primary care provider. This is so often the case that I have gradually devolved into their backup, all-purpose doctor. I am the doc they notify when they get hospitalized for pneumonia…

  • About Us
  • Meet the Editors
  • Issue Archives
  • Contribute
  • Advertise
  • Contact Us
  • Copyright © 2025 by John Wiley & Sons, Inc. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies. ISSN 1931-3268 (print). ISSN 1931-3209 (online).
  • DEI Statement
  • Privacy Policy
  • Terms of Use
  • Cookie Preferences