HIPAA

  • [addtoany]
    Lack of firewall in secondary systems shows why risk analysis is crucial in healthcare settings.
    Large organizations look at the big picture, forgetting oftentimes that it’s a small chink-in-the-armor that renders a downfall. Such is the case involving the University of Massachusetts at Amherst (UMass), who despite the best intentions, fell victim to a HIPAA disaster after a malware issue   Read more..
    Posted on 24 Aug, 2017
    Malware Issue Highlights Need for HIPAA Security Plan
  • [addtoany]
    Follow 7 expert-recommended steps to evaluate, document, and report breaches.
    With the increase in data breach incidents—as well as the rise in HIPAA breach penalties—it’s more important than ever before for covered entities (CEs) and business associates (BAs) to develop a thorough incident response plan. Here’s what you need to do right now to protect   Read more..
    Posted on 10 Aug, 2017
    Plot Out Your Organization’s Security Incident Response Plan
  • [addtoany]
    Consider conducting security audits to evaluate your BA’s security and privacy practices.
    Are your business associates (BAs) ready to respond to a HIPAA breach? When it comes to answering this question, what you don’t know can hurt you. According a Cyber-Awareness Monthly Update from the HHS Office for Civil Rights (OCR), covered entities (CEs) and BAs should think   Read more..
    Posted on 3 Aug, 2017
    Four Steps to Secure Your BAs from Breaches
  • [addtoany]
    The HIPAA Breach Notification rule (§164.400 et seq.) requires you to take specific actions when faced with a breach incident. Sheldon-Dean outlines the following steps you need to take to evaluate and report breaches, as well as to properly document compliance incidents:         Report all breaches   Read more..
    Posted on 9 Jun, 2017
    7 Steps to Evaluate & Report HIPAA Breaches
  • World Password Day: Ensure a Safe Presence in the Digital World!
  • [addtoany]
    Rx pads, unprotected computers are theft hotspots.
    We all know the problems that can arise when a patient’s medical identity is stolen. Unfortunately for medical offices, these same identity thieves are trying to nab your practice’s information as well. Take some advice from CMS’s course “Safeguarding Your Medical Identity,” which showed practices how   Read more..
    Posted on 14 Dec, 2015
    Want to Trump Practice ID Thieves? Heed This Expert Advice
  • [addtoany]
    Some vendors might balk, but it’s the rule.
    Medical practices often have to do business with outside vendors. Many of these outside vendors are bound to follow business associate (BA) guidelines under the Health Insurance Portability and Accountability Act (HIPAA). To avoid any confusion or angst during your vendor negotiations, be sure to know   Read more..
    Posted on 22 Sep, 2015
    Sharing Health Info With Vendors? Consider Them BAs
  • [addtoany]
    There is no sign that HIPAA will slow down on audits.
    Even halfway through the year, HIPAA compliance continues to be at the top of every practice’s must-watch list. The rub: It’s tough to know where to focus your compliance reviews. Experts offer advice on one particular area of compliance that HIPAA will continue to focus on:   Read more..
    Posted on 21 Sep, 2015
    Prep for OCR Scrutiny As HIPAA Continues 2015 Reviews
  • [addtoany]
    Alert patient, Secretary when private info gets exposed.
    When a HIPAA breach occurs at your practice, you must file notifications as per the instructions of the U.S. Department of Health & Human Services (HHS). They’re so serious about these notices, there’s even a rule on the books. “The HIPAA Breach Notification Rule, 45 CFR   Read more..
    Posted on 20 Sep, 2015
    Keep Feds Abreast Of All HIPAA Breaches

Popular Posts

Newsletter Signup

Top