Healthcare Information Security

HIPAA and Compliance News

Top Tips on Conducting a HIPAA Risk Assessment

by

A HIPAA risk assessment is essential for all covered entities (CEs). Ideally, organizations conduct such an analysis before the Office for Civil Rights (OCR) comes knocking on their door. That way, CEs learn about potential weak spots in their...

Breaking Down HIPAA: Health Data Encryption Requirements

by

Health data encryption is becoming an increasingly important issue, especially in the wake of large scale data breaches like Anthem, Inc. and Premera Blue Cross. The HIPAA Omnibus Rule improved patient privacy protections, gave individuals new...

The HIPAA Risk Assessment: A Journey, Not A Destination

by

A HIPAA risk assessment can be an important tool in helping covered entities determine how they can best improve their overall privacy and security measures. With two large scale healthcare data breaches being announced already in 2015, it is...

OCR HIPAA Audits Delayed Once Again

by

The Department of Health & Human Services (HHS) Office for Civil Rights (OCR) Director Jocelyn Samuels still does not have a set date for when the next round of HIPAA audits will take place. Samuels spoke earlier this week at the 23rd National...

Breaking Down HIPAA Rules: HIE Security

by

HIE security is an increasingly important issue, especially as the push for interoperability continues. We’ve previously discussed how the HIPAA Omnibus Rule made important impacts on several aspects of HIPAA rule, and how covered entities...

Determining Whether a HIPAA Data Breach Occurred

by

Covered entities need to be able to determine if a HIPAA data breach has taken place following the potential exposure of sensitive data. The implementation of the HIPAA Omnibus Rule slightly changed this process, in that there were new determining...

HIPAA Regulations v. FERPA Rules In Privacy Rights

by

HIPAA regulations were created to ensure that patients’ PHI remained secure, and that individuals would not have to worry about their personal information falling into the wrong hands. Similarly, the Family Educational Rights and Privacy Act...

Key Factors for the HIPAA Privacy Rule in Emergencies

by

The HIPAA Privacy Rule was designed to help keep protected health information (PHI) from becoming exposed or easily accessible to the public. But what happens in an emergency situation? When does the public’s safety trump the privacy of...

Breaking Down HIPAA Rules: Data Breach Notification

by

Recent headlines are bringing certain HIPAA rules and regulations to the forefront of healthcare, legal, and public discussion. In the wake of the Anthem data breach that potentially exposed the personally identifiable information of up to 78...

Should HIPAA Regulations Require Data Encryption?

by

Following the Anthem data breach where nearly 80 million individuals’ personally identifiable information was potentially exposed, certain HIPAA regulations are coming under scrutiny. In particular, organizations and legislators are beginning...

Healthcare Security and Compliance Increases, Says DataMotion

by

The majority of healthcare organizations – 97 percent – have put healthcare security and compliance measures into place, according to DataMotion’s third annual survey on corporate email and file transfer habits. This is an increase...

Key Reminders For Your HIPAA Security Risk Assessment

by

The HIPAA security risk assessment is an important way for healthcare organizations to evaluate the potential risks and vulnerabilities within their facility and how they are adhering to HIPAA. All covered entities and their business associates...

Potential HIPAA Violation From Minn. BCBS Nurse

by

A Minnesota Blue Cross Blue Shield (BCBS) nurse possibly committed a HIPAA violation after he inappropriately accessed a state database containing prescription information for 1 million Minnesotans, according to a WCCO-TV report. The BCBS nurse,...

Will Patient Privacy Violations Occur With Missouri Law?

by

Will the importance of the public’s safety outweigh concerns over potential patient privacy violations? That debate continues in Missouri, as lawmakers will soon discuss whether preschools and daycare centers must tell parents if there are...

Potential HIPAA Violations After Wisc. and Texas Thefts

by

Unfortunately, HIPAA violations can still occur even when healthcare facilities implement comprehensive security measures and keep them properly updated. Employee training can also help mitigate some risk, but organizations must be prepared that...

Consumer Health Privacy Violated Online, Says New Study

by

Health privacy concerns could continue to rise, especially as a recent study showed that the majority of third-party companies potentially gained access to consumers’ health information from online searches. Specifically, an analyzation of...

Breaking Down HIPAA Rules and Regulations: Business Associates

by

As healthcare providers strive to meet new mandates and reach new quality of care goals, they should always keep HIPAA rules and regulations in mind. The tangle of changes and multiple impacts to the workings of healthcare facilities can be...

Are HIPAA Regulations the Best Answer for Patient Privacy?

by

Patient privacy is an essential aspect of the healthcare industry, and HIPAA regulations were designed with that in mind. With the increase in EHR use, more facilities are turning to online systems. But are these new systems actually the most...

Healthcare Data Breach Leads To State Court Case

by

A former patient filed a lawsuit against Aventura Hospital and Medical Center following the facility’s third healthcare data breach in two years. According to a report on Courthousenews.com, Kellie Lynn Case filed the suit in Miami Federal...

PHI Data Breaches Increase 25% in 2014, Says Redspin Report

by

Last year, 164 PHI data breaches were reported to the Secretary of Health & Human Services (HHS) Office of Civil Rights (OCR), according to the fifth annual Redspin data breach report. That is a 25 percent increase over 2013 and approximately...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks