HIPAA, Patient Privacy, Healthcare Data Security BYOD

HIPAA Compliance

Breaking Down PHI Security Breaches and Their Impact

May 22, 2015 - With another large health data breach being announced this week, it is essential that covered entities of all sizes understand the intricacies of PHI security. However, there is an important distinction in types of data that healthcare organizations keep on hand. While individuals deserve to be notified if any of their personal information is potentially accessed by unauthorized  users,...


Articles

How Health Privacy Regulations Hinder Telehealth Adoption

Health privacy regulations are one of the potential deterrents when it comes to telehealth adoption, according to a report by the American Hospital Association (AHA). Moreover, numerous legal and regulatory challenges can also make the process...

How Do HIPAA Regulations Affect Workplace Wellness Programs?

The Department of Health and Human Services (HHS) recently posted clarification for how HIPAA regulations would potentially apply to workplace wellness programs. With the Equal Employment Opportunity Commission (EEOC) also publishing a proposed...

How Rush Medical Stays HIPAA Compliant, Uses Cybersecurity

Staying HIPAA compliant is not always an easy task, especially as new technological options develop, such as cloud computing, mobile devices, and EMRs. Rush University Medical Center has altered its cybersecurity measures over the last few years...

Stage 3 Meaningful Use: Breaking Down HIPAA Rules

CMS released its Stage 3 Meaningful Use proposal last month, with numerous aspects that covered entities (CEs) need to be aware of and pay attention to. While the proposal has a large focus on EHR interoperability, it continues to build on the...

Why Understanding HIPAA Rules Will Help With ONC Certification

Understanding HIPAA rules will have far reaching benefits for covered entities. Not only will they be compliant in terms of keeping patient PHI secure, but it will also ensure that those facilities are able to adhere to other federal certification...

Is the HIPAA Security Rule Doing Enough for Healthcare?

The HIPAA Security Rule created a national set of security standards designed to protect certain health information, either held or transferred in electronic form. However, technology has continued to evolve, and one healthcare security expert...

ONC Releases Electronic Health IT Privacy, Security Guide

The Office of the National Coordinator for Health Information Technology (ONC) released an updated version of its guide on electronic health IT privacy and security earlier this week. The guide outlines ways for covered entities to properly integrate...

Understanding HIPAA Regulations and Their Applications

CHICAGO – Understanding HIPAA regulations is key for healthcare providers, hospitals, and any other covered entity. However, HIPAA was implemented before many of today’s current technologies were in use, and the specifics can sometimes be...

HIPAA Compliance, Cybersecurity Top HIMSS15 Topics

Even without large data breaches, the healthcare industry must remain current on the latest HIPAA compliance trends and best approaches to comprehensive cybersecurity. The annual HIMSS conference will tackle these issues, among many others, head...

Current HIPAA Requirements Sufficient, AHA Tells ONC

The current HIPAA requirements are enough to support the improvement of the healthcare infrastructure to better support secure data sharing in support of clinical care, according to the American Hospital Association (AHA). In a letter to the...

De-Identifcation of Data: Breaking Down HIPAA Rules

The de-identification of data is an important part of healthcare technology, especially as the use of EHRs and HIEs becomes more prominent. The HIPAA Privacy Rule states that once data has been de-identified, covered entities can use or disclose...

Premera Data Breach Leads to Lawsuits, Lawmaker Concern

The Premera data breach that potentially put the sensitive information, including PHI, of 11 million individuals at risk has now led to five class action lawsuits. The suits were filed in U.S. District Court in Seattle on behalf of Premera customers...

HIPAA Compliance in the Cloud: Breaking Down HIPAA Rules

HIPAA compliance in the cloud is becoming an increasingly important topic as more covered entities (CEs) begin to consider this option for data storage. Even as technology evolves, it is essential that CEs – and their business associates...

Patient PHI Compromised by Florida Hospital Employees

No healthcare facility wants patient PHI compromised, let alone by its own employees. However, that is the situation that Florida Hospital is currently working through, according to a facility statement. Two employees, who have since been terminated,...

What Are the Legal Concerns in a HIPAA Risk Assessment?

No healthcare organization wants to find itself in legal trouble when it comes to conducting a HIPAA risk assessment. Facilities must ensure that they are adhering to all federal requirements, as well as any state or local laws. That way, the...

The HIPAA Risk Assessment: A Journey, Not A Destination

A HIPAA risk assessment can be an important tool in helping covered entities determine how they can best improve their overall privacy and security measures. With two large scale healthcare data breaches being announced already in 2015, it is...

Breaking Down HIPAA Rules: HIE Security

HIE security is an increasingly important issue, especially as the push for interoperability continues. We’ve previously discussed how the HIPAA Omnibus Rule made important impacts on several aspects of HIPAA rule, and how covered entities...

Determining Whether a HIPAA Data Breach Occurred

Covered entities need to be able to determine if a HIPAA data breach has taken place following the potential exposure of sensitive data. The implementation of the HIPAA Omnibus Rule slightly changed this process, in that there were new determining...

HIPAA Regulations v. FERPA Rules In Privacy Rights

HIPAA regulations were created to ensure that patients’ PHI remained secure, and that individuals would not have to worry about their personal information falling into the wrong hands. Similarly, the Family Educational Rights and Privacy Act...

X

Sign up for our free HealthITSecurity.com newsletter and stay up to date with tips and advice on:

HIPAA
BYOD
Data Security
VDI
Cloud Security

Our privacy policy

no, thanks