Live Support Software
   

HIT Security Column

Show Me Your HIPAA Security File

Show Me Your HIPAA Security File

Show me your HIPAA security file and I’ll show you mine. Did you know that HIPAA requires you to maintain security documentation for six years? This requirement applies to both Covered Entities and Business Associates. If you open your security file and nothing but a half-eaten sandwich falls out, the time to start one is […]

April 13, 2015 | By More
HIPAA Requires Access to Health Records

HIPAA Requires Access to Health Records

Ransomware is a growing threat for healthcare providers Healthcare providers may not be aware that HIPAA requires access to health records, in addition to protecting data from breaches. Remember that the HIPAA Security Rule is designed to protect the Confidentiality, Integrity, and Availability (CIA) of health information. When we think of HIPAA, we usually think […]

March 23, 2015 | By More
Disaster Recovery is a HIPAA Requirement

Disaster Recovery is a HIPAA Requirement

Disaster recovery is probably the most neglected area of HIPAA compliance for ambulatory practices. Hospitals have disaster recovery and business continuity plans because they care for critical patients and stand to lose many thousands of dollars each day they are closed. But many ambulatory practices imagine they’ll muddle through any disaster. They may not realize […]

February 9, 2015 | By More
Medical Mergers Bring HIPAA Breaches

Medical Mergers Bring HIPAA Breaches

Hospitals and medical groups are in a frenzy of mergers and acquisitions, but many are not protecting themselves from the increased risk of HIPAA breaches that results. The latest example comes from Northwestern Medical Group, a highly respected healthcare organization based in Chicago. On December 19th, Northwestern announced that an employee laptop with nearly 3,000 […]

January 4, 2015 | By More
Vendors and Other Vulnerabilities

Vendors and Other Vulnerabilities

The largest data breaches of the last year occurred when cyber-criminals used vendors to gain unauthorized access to computer networks. Unfortunately, it is only a matter of time before the same methods enable a massive breach of healthcare data. In fact, I would wager that hackers have already used a Business Associate to plant malware […]

November 10, 2014 | By More
Encryption is Key to HIPAA Compliance

Encryption is Key to HIPAA Compliance

There have been about 125,000 breaches of HIPAA data in the last few years, and 60 percent of them could have been prevented by encryption. For me, this was the big takeaway from the OCR and NIST conference in Washington D.C. last month. Of course, this number includes only the reported breaches. A fair estimate […]

October 27, 2014 | By More
High HIPAA Hopes

High HIPAA Hopes

September Survey Reflects Optimistic Compliance Outlook A recent survey conducted by 4Medapproved, sought the opinions of the medical community regarding their current HIPAA compliance status. One hundred and eighty participants reported surprising results. Reflecting¬†a¬†decent sized sample of the healthcare industry population, the answers to two questions and the accompanying comments are encouraging news for HIPAA […]

October 6, 2014 | By More