Overview of HIPAA Rules and Compliance
With the HIPAA Security Rule getting a lot of attention this month, now seems like a great time to revisit the basics of the HIPAA rules.
With the HIPAA Security Rule getting a lot of attention this month, now seems like a great time to revisit the basics of the HIPAA rules.
The new HIPAA Security Rule delivers a scalable approach and guidelines to protect electronic protected health information (ePHI).
In recent posts, we have discussed how advances in technology are affecting businesses in general as we continue through 2019. From AI to the IoT, technological advances are finding utilization across all spheres of our daily life. Healthcare technology trends look similar to those in the broader marketplace, with specific application to the medical field. Here [...]
Often, when people think of a malware attack, trojan threat or cyber hack, they assume that the criminals are targeting large financial institutions or retail giants. The fact is that increasingly, small to medium sized businesses are the targets of these cyber crimes. This is due to the fact that they often have less stringent [...]
Any firm, organization or medical practice which deals with Personal Health Information (PHI) is bound by the laws and regulations set forth in the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Personal health information includes all paper or electronic patient records, and guidelines are designed to restrict access to PHI to only those parties [...]
The Cyber Security Task Force was formed by the Department of Health and Human Services (HHS) in reaction to the Cyber Security Act. Task force members represent a broad spectrum of organizations within the health care sector.
Statistics in 2017 proved that not only are companies in the healthcare sector not as prepared to face the challenges, but are more likely to be susceptible to malware attacks.
For a medical practice utilizing EHR, there are two avenues to consider in regards data storage. You can either employ a traditional client-server environment, or access cloud-based computing.
Whether you are looking to add cloud-based applications to your network, or you are a provider of cloud based services which works with medical entities, it is important to understand the nuances of the rules in order to ensure HIPAA compliant cloud computing.
If your organization handles protected health information (PHI), it is your responsibility to guarantee that all the required physical, network, and process security measures are in place, and that all HIPAA protocols are being adhered to.