< >
  • Recent Health IT Security Articles

    • HIPAA Business Associate Agreements: What Needs to be Included?

      The deadline for all HIPAA business associate agreements (BAAs) to be up to date and in line with the regulations set forth by the Omnibus Rule was nearly one month ago. As of September 23, 2014, BAAs not renewed before September 23, 2013 were require...

    • EY Principal: Strong EHR Security Essential for Healthcare

      Without strong EHR security, it could be extremely difficult to not only prevent healthcare data breaches, but also to react to them accordingly. With medical identity theft being an extremely lucrative option for cyber criminals, healthcare organizati...

    • Are Small Healthcare Facilities Prepared for Data Breaches?

      Regardless of a healthcare provider’s size, it can be susceptible to data breaches if the proper precautions are not taken. Even if all regulations are strictly followed, a mistake can happen and patients’ protected health information (PHI) can be ...

    • Data Breach News: Pa. Server Hacked; Records Found Dumped

      A Pennsylvania healthcare service confirmed last week that it had a data breach incident where personal health information (PHI) may have been exposed. Penn Highlands Brookville released a statement that said the data breach was discovered on Augus...

    • Fla. Court: HIPAA Not Violated in Malpractice Reform

      Physician defendants can have equal access to plaintiffs’ health information, as it is not in violation of HIPAA, according to a recent Florida federal appeals court ruling. The decision upheld a tort reform law, which says that prospective plaint...

    • AMA: MU Secure Messaging Criteria Should Be Optional

      The Centers for Medicare and Medicaid Services (CMS) should make the "view-download-transmit," transitions of care and secure messaging criteria in stage 2 Meaningful Use optional, according to the American Medical Association (AMA). That was one of se...

    • HIPAA Best Practices: Acceptable Use Policies, Team Training

      In an earlier post, we discussed the steps to performing a Risk Assessment. Once you’ve determined the risks within your healthcare environment, you can enlist your staff members to help you address those risks. To do this, you need to create policie...

    • Oregon Health Insurance Exchange Suffers 18th Breach

      An Oregon health insurance exchange (HIE) has had 18 security breaches in the last six months, with the most recent one occurring when documents containing PHI was sent to the wrong patient. According to the Associated Press, Ann Migliaccio applied ...

    • Patient Privacy Notices: What Is Authorized Disclosure?

      No healthcare organization wants to be part of a data breach. With patient privacy notices, facilities must be especially careful so as not to inadvertently release a patient’s protected health information (PHI). Healthcare organizations need to limi...

    • ‘Small Number’ Of Laptops With PHI Missing From Ambulances

      Over a period of approximately three years, a “small number” of laptops have gone missing from ambulances in the Dallas area. The laptops in question disappeared between January 1, 2011, and August 29, 2014, according to the Dallas Morning News, an...

  • News Archives

    no, thanks

    Sign up for our free HealthITSecurity.com newsletter and stay up to date with tips and advice on:

    • HIPAA
    • BYOD
    • Data Security
    • VDI
    • Cloud Security

    Our privacy policy