Live Support Software
   

HITapproved Industry Highlights

Privacy in Healthcare: A State of Confusion

Privacy in Healthcare: A State of Confusion

The following is a guest blog post from hitechanswers.net, a community hub site dedicated to educating healthcare providers and other stakeholders on the HITECH Act, the CMS EHR Incentive Program, Meaningful Use and other Federal Health IT initiatives. Matthew Fisher is the chair of the Health Law Group at Mirick, O’Connell, DeMallie & Lougee, LLP, in Worcester, MA. Matt advises his clients in all aspects of healthcare regulatory compliance, including HIPAA, the Stark Law and the Anti-Kickback Statute. This article was originally published on Mirick O’Connell’s Health Law Blog and is republished here […]

February 8, 2016 | By More
Latest Provider Updates from CMS

Latest Provider Updates from CMS

CMS Weekly Check-up The Centers for Medicare & Medicaid Services (CMS) is the Federal agency under the Department of Health & Human Services (HHS) which administers Medicare, Medicaid, and the State Children’s Health Insurance Program. The CMS EHR Incentive programs are currently open programs for eligible professionals and hospitals to receive incentive payment for participation. Checking in on CMS will be a regular weekly post to keep up with communication coming from CMS on information about these and other related programs. Reforms to Medicare regulations identified as unnecessary, obsolete, or excessively […]

February 8, 2016 | By More
Security Concerns Threaten Mobile Health App Deployment

Security Concerns Threaten Mobile Health App Deployment

The following is a guest blog post from HealthcareScene.com, Health IT Blog Network, by John Lynn, guest contributor and 4Medapproved Partner. Guest author Anne Zieger, veteran healthcare consultant and analyst with 20 years of industry experience. Contact her at @ziegerhealth on Twitter or visit her site at Zieger Healthcare. Healthcare organizations won’t get much out of deploying mobile apps if consumers won’t use them. And if consumers are afraid that their personal data will be stolen, they’ve got a reason not to use your apps. So the fact that both consumers and HIT […]

February 1, 2016 | By More
CMS Draft

CMS Draft

CMS Weekly Check-up The Centers for Medicare & Medicaid Services (CMS) is the Federal agency under the Department of Health & Human Services (HHS) which administers Medicare, Medicaid, and the State Children’s Health Insurance Program. The CMS EHR Incentive programs are currently open programs for eligible professionals and hospitals to receive incentive payment for participation. Checking in on CMS will be a regular weekly post to keep up with communication coming from CMS on information about these and other related programs. Reforms to Medicare regulations identified as unnecessary, obsolete, or excessively […]

January 25, 2016 | By More
Cybersecurity: An Essential Focal Point

Cybersecurity: An Essential Focal Point

The following is a guest blog post from hitechanswers.net, a community hub site dedicated to educating healthcare providers and other stakeholders on the HITECH Act, the CMS EHR Incentive Program, Meaningful Use and other Federal Health IT initiatives. Matthew Fisher is the chair of the Health Law Group at Mirick, O’Connell, DeMallie & Lougee, LLP, in Worcester, MA. Matt advises his clients in all aspects of healthcare regulatory compliance, including HIPAA, the Stark Law and the Anti-Kickback Statute. This article and is republished here with permission. Every industry, whether it be healthcare, financial, […]

January 25, 2016 | By More
Latest Provider Updates from CMS

Latest Provider Updates from CMS

CMS Weekly Check-up The Centers for Medicare & Medicaid Services (CMS) is the Federal agency under the Department of Health & Human Services (HHS) which administers Medicare, Medicaid, and the State Children’s Health Insurance Program. The CMS EHR Incentive programs are currently open programs for eligible professionals and hospitals to receive incentive payment for participation. Checking in on CMS will be a regular weekly post to keep up with communication coming from CMS on information about these and other related programs. Reforms to Medicare regulations identified as unnecessary, obsolete, or excessively […]

January 24, 2016 | By More
Will CMS End Meaningful Use?

Will CMS End Meaningful Use?

Will CMS end Meaningful Use? If you have been living under a rock, or do not obsess over HIT matters, you may not have heard the news this week that CMS Administrator Andy Slavitt said that the Meaningful Use (MU) program is likely to end in 2016. This announcement comes after repeated assurances from CMS that MU will continue through 2018. It also comes after two tumultuous years for the program, when CMS allowed reduced reporting periods and hardship exceptions to accommodate the implementation of 2014 Edition EHRs and the […]

January 18, 2016 | By More
Tiny Budgets Undercut Healthcare’s Cyber Security Efforts

Tiny Budgets Undercut Healthcare’s Cyber Security Efforts

The following is a guest blog post from HealthcareScene.com, Health IT Blog Network, by John Lynn, guest contributor and 4Medapproved Partner. Guest author Anne Zieger, veteran healthcare consultant and analyst with 20 years of industry experience. Contact her at @ziegerhealth on Twitter or visit her site at Zieger Healthcare. This has been a lousy year for healthcare data security — so bad a year that IBM has dubbed 2015 “The Year of The Healthcare Security Breach.” In a recent report, Big Blue noted that nearly 100 million records were compromised during the […]

January 11, 2016 | By More
Security Apathy: The Rise of Medical Hacking and Biomedical Fraud in 2016

Security Apathy: The Rise of Medical Hacking and Biomedical Fraud in 2016

By Wendy Whitmore, CIO 4Medapproved While interoperability remains at the forefront of concern in Health IT for 2016, medical hacking and biomedical fraud are also garnering the attention of security professionals in the industry into the next decade. The escalating ease with which cyber-crimes can be committed is alarming and the perpetrators are becoming more aggressive. For instance, a critical access hospital in Illinois was targeted by a hacker who sent an anonymous email containing some of the facilities electronic protected health information (ePHI), threatening to release more data unless […]

January 4, 2016 | By More