Healthcare Information Security

HIPAA

HIPAA Regulations v. FERPA Rules In Privacy Rights

by Elizabeth Snell

HIPAA regulations were created to ensure that patients’ PHI remained secure, and that individuals would not have to worry about their personal information falling into the wrong hands. Similarly, the Family Educational Rights and Privacy...

Potential HIPAA Violations After Wisc. and Texas Thefts

by Elizabeth Snell

Unfortunately, HIPAA violations can still occur even when healthcare facilities implement comprehensive security measures and keep them properly updated. Employee training can also help mitigate some risk, but organizations must be...

Breaking Down HIPAA Rules and Regulations: Business Associates

by Stephanie Reardon

As healthcare providers strive to meet new mandates and reach new quality of care goals, they should always keep HIPAA rules and regulations in mind. The tangle of changes and multiple impacts to the workings of healthcare facilities can...

Are HIPAA Regulations the Best Answer for Patient Privacy?

by Elizabeth Snell

Patient privacy is an essential aspect of the healthcare industry, and HIPAA regulations were designed with that in mind. With the increase in EHR use, more facilities are turning to online systems. But are these new systems actually the...

Medical Identity Theft Increases 21%, Says Ponemon Study

by Stephanie Reardon

When patients’ PHI is stolen, medical identity theft could occur. Moreover, providers that don’t comply with HIPAA standards could face heavy fines, as well as other challenges to their reputation and their patients’...

Should More Patients Worry About Healthcare Data Security?

by Elizabeth Snell

An organization should always have the state of its healthcare data security as a top priority. Especially as technology evolves and more facilities connect to HIEs, implement new EHRs and potentially even consider telehealth, it is...

Why HIPAA Privacy and HIPAA Security Rules are Needed

by Elizabeth Snell

The federal Health Insurance Portability and Accountability Act of 1996 (HIPAA) is hardly a new concept in the healthcare industry. However, as technology evolves, it is important that facilities of all sizes continue to adhere to HIPAA...

What Constitutes a HIPAA Violation?

by Elizabeth Snell

Covered entities must remain current on privacy regulations to ensure they do not commit a HIPAA violation. No individual wants his or her protected health information (PHI) to be unnecessarily made public. Not only is the information...

Dorn VA Employee Elaborates on Healthcare Security Breach

by Stephanie Reardon

Employee claims that personal health information documents involved in healthcare security breach were often kept in an unsecured room. A Dorn VA Medical Center employee has stepped forward to speak out on a security breach within the...

How Will Healthcare Privacy and Security Fare in 2015?

by Elizabeth Snell

The healthcare industry was riddled with data breaches, HIPAA violations, and concerns over patient privacy rights in 2014. Will 2015 be any different, or can patients expect many of the same problems when it comes to keeping their...

Tennessee Hospice Investigated Over Potential HIPAA Violation

by Elizabeth Snell

A potential HIPAA violation occurred after patient records at a Tennessee hospice wound up on the side of a highway. A hospice employee’s failure to properly shed patient records is being blamed as the culprit in a potential HIPAA...

Are You Ready for a HIPAA Security Risk Assessment?

by Elizabeth Snell

There are numerous aspects of a HIPAA security risk assessment that healthcare organizations must keep in mind. Even though the Department of Health and Human Services’ (HHS) HIPAA security risk assessment tool has not even had a...

AMIA’s Recent HIPAA Compliance Question: A Legal Perspective

by Elizabeth Snell

Last week an American Medical Informatics Association (AMIA) letter to state Representative Fred Upton was released. AMIA called for HIPAA compliance to be updated to allow for exemptions in terms of access to patient’s PHI,...

HIPAA Mandates Discussed, Comments Sought in EHNAC Program

by Elizabeth Snell

EHNAC released a draft of its accreditation program, including discussions on HIPAA mandates. The Electronic Healthcare Network Accreditation Commission (EHNAC) released the first draft of its latest accreditation program this week. The...

Should HIPAA Compliance Let Researchers Access Patients’ PHI?

by Elizabeth Snell

AMIA recommended that HIPAA compliance should allow researchers to gain access to patients’ PHI without their permission. Allowing health researchers to access patients’ PHI without their permission could be beneficial, according...

NY Subcontractor Causes Healthcare Data Breach

by Elizabeth Snell

An insurer notified patients of a potential healthcare data breach when its subcontractor mishandled PHI. A health insurance subcontractor allegedly mishandled the information of approximately 500 people in New York, leading to a potential...

Are Medical Practices Prepared for OCR HIPAA Audits?

by Stephanie Reardon

The Office for Civil Rights of the Department of Health and Human Services will be conducting random HIPAA audits. Although a timeline has not yet been set, the Office for Civil Rights (OCR) of the Department of Health and Human Services...

Six Ways to Stay HIPAA Compliant and Keep PHI Safe

by Jay Atkinson

As your organization’s CIO, do you know whether your business is HIPAA compliant or if it has access to protected health information (PHI)? If you don’t know the answers, it’s critical for you to find out. ...

How Long Can Healthcare Data Breaches Affect Facilities?

by Elizabeth Snell

Healthcare data breaches can affect organizations long after the security issue was discovered and patients were notified of the problem. Healthcare data breaches are unfortunately becoming a common scenario for hospitals, health systems...

Breaking Down OCR’s HIPAA Bulletin

by Elizabeth Snell

Last week, the Department for Health and Human Services (HHS), Office for Civil Rights (OCR) released a bulletin outlining how healthcare organizations can abide by HIPAA in various emergency situations – including the...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy


no, thanks

Continue to site...