twitter

Resources

Secure ID Coalition Comments to the House Financial Services Committeepdf button 
Hearing on "Protecting Consumers: Financial Data Security in the Age of Computer Hackers"
May 21, 2015

Secure ID Coalition Releases Its 2015 State ID Report
Report: "State Secure Identity Practices and Policies in 2015"
June 10, 2015

The Hill Publishes Secure ID Coalition Executive Director Kelli Emerick's Statement Regarding Emerging Payment Technologies
Article: "Secure smart cards and mobile payments"
November 17, 2014

Secure ID Coalition Comments to the Senate Finance Committeepdf button
Hearing on "Health Information Technology: Using IT to Improve Care"
July 24, 2013

Testimony of the Secure ID Coaltion Before the U.S. Department of Health & Human Services National Committee on Vital and Health Statisticspdf button
Subcommittee on Standards Meeting
February 28, 2013

Secure ID Coalition Comments to Office of the National Coordinator for Health Information Technology; HIT Policy Committeepdf button
Request for Comments: Regarding the Stage 3 Definition of Meaningful Use of Electronic Health Records (EHRs)
January 14, 2013

Testimony of the Secure ID Coaltion Before the House Energy and Commerce Subcommittee on Healthpdf button
Hearing on "Examining Options to Combat Health Care Waste, Fraud, and Abuse"
November 28, 2012

Secure ID Coalition Comments to the Senate Finance Committee pdf button
Request for Information: Medicare & Medicaid Integrity
June 29, 2012

Secure ID Coalition Comments to the Department of Health and Human Services  pdf button
Request for Information: Nationwide Health Information Network: Conditions for Trusted Exchange
June 29, 2012

Secure ID Coalition Comments to the Department of Health and Human Services pdf button
Notice of Proposed Rulemaking: Stage 2 Meaningful Use: Medicare and Medicaid Programs; Electronic Health Record Incentive Program
May 7, 2012

Secure ID Coalition Comments to the Federal Reserve Board of Govenors pdf button
Debit Card Interchange Fee and Routing
September 30, 2011

Secure ID Coalition Applauds Introduction of the Medicare Common Access Card Act pdf button
September 14, 2011

Secure ID Coalition Comments to the Department of Health and Human Services
Health Information Technology Policy Committee - Meaningful Use Stage 2
February 25, 2011

Secure ID Coalition Comments to the Federal Reserve Board of Governors
Debit Card Interchange Fees and Routing
February 22, 2011

Learn How

Secure ID News to Know

  • Making Medicare Smart

    Today the House of Representatives took a significant step forward to protect seniors and ensure the solvency of the Medicare program by unanimously passing the bipartisan Fighting Fraud to Protect Senior Care Act – HR.6690. The bill calls for a pilot program to test modernizing the Medicare card by incorporating smart card technology to prevent waste, fraud and abuse.

    This landmark program will enable front-end authentication of Medicare beneficiaries and providers at point of care and support back-end data analytics to ensure transactions are legitimate. The Government Accountability Office estimates that such a program can positively impact over 22% of all Medicare improper payment and fraud cases. With Medicare waste, fraud, and abuse costing US taxpayers an approximated $60 billion every year, the Fighting Fraud to Protect Senior Care Act will help prevent over $13.2 billion from being lost on a yearly basis.

    We thank Congressman Peter Roskam and Congressman Earl Blumenauer for their heroic effort to protect Medicare for all Americans: beneficiaries, providers, and taxpayers alike.


     
  • The Five Things IoT Manufacturers Can Do To Future-Proof the Industry

    If there’s one thing that we’ve learned over the past few days since the Internet of Things (IoT) distributed-denial-of-service attack (DDoS) attack gave the Internet brain freeze last Friday is that (1) IoT devices are insecure, (2) we have a really good idea what needs to be done to make them more secure, yet (3) it’s hard to get everyone on the same page in dedicating the resources to actually make them more secure.

    While that might seem like a stark truth, it only makes sense given how our economy and legal system works. Since no one company or device was responsible for allowing the attack, there’s no specific organization to shame or blame. Plus, it’s way too easy to point fingers at everyone else in the room and say there was nothing that could’ve been done, as everyone is responsible. Further, security costs money, and at the moment, companies want to pour their resources into grabbing IoT market share, not plugging holes that may or may not cause problems downstream. Unfortunately, this kind of thinking invites regulators and legislators to step in and attempt to dictate technology standards and best practices to address harms, both real and imagined.

    Read more...
     
  • Patient Identity: Getting Back to Basics for National Health IT Week

    Monday kicked off National Health IT week! While the United States has made progress in moving towards a more modern healthcare system, significant work remains. There’s no disputing that our medical device and health technology companies are the most advanced on the planet, developing the solutions that are diagnosing diseases earlier, expanding treatment options, and improving quality of life. However, when it comes to healthcare and identity—making sure that the correct data is associated with the right patient, and ensuring that that information is able to be shared, analyzed, and acted upon in a timely fashion—the United States lags woefully behind many other developed nations.

    Read more...