Blog Posts Tagged with "HITECH"

959779642e6e758563e80b5d83150a9f

About Compliance and Security

December 02, 2010 Added by:Danny Lieberman

If you’re an IT vendor, there may be gold in them thar hills. But when you’re running your business, don’t leave your ethics at home and don’t wait for government to tell you what you learned from your parents at age 5 – always put your toys away, and don’t steal from the other kids...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Over Five Million Now Victims of Healthcare Breaches

November 23, 2010 Added by:Headlines

The Department of Health and Human Services released statistics on health information breaches that show a total of 5.35 million records have been compromised since September 2009. One of the most recent breaches at Keystone/AmeriHealth Mercy Health Plans involved over 280,000 records...

Comments  (0)

10e258c8d23d441b915c1b2333b6996a

Business Associates Must Be HIPAA Compliant

October 09, 2010 Added by:Jack Anderson

In response to a question from a potential client I asked Rebecca Herold, The Privacy Professor to comment on when a BA must be compliant. I will let her answer speak for itself...

Comments  (0)

10e258c8d23d441b915c1b2333b6996a

HIPAA Violations Not Always Due to Data Breaches

October 01, 2010 Added by:Jack Anderson

You don't have to have a patient data breach to be in violation of HIPAA rules and regulations. By doing nothing, not even thinking, you probably have already committed a violation. If you don't have a breach notification program in place you are in violation now...

Comments  (2)

959779642e6e758563e80b5d83150a9f

More Nonsense with Breach Numbers

September 01, 2010 Added by:Danny Lieberman

Now it’s some lazy journalist at Information Week aiding and abetting the pseudo-statistics of of the Ponemon Institute – screaming headlines of the cost of data breaches of PHI – protected healthcare information...

Comments  (0)

10e258c8d23d441b915c1b2333b6996a

Business Associates Liable for Breach

August 21, 2010 Added by:Jack Anderson

Proposed modifications include changes required by the HITECH Act and others deemed appropriate by OCR in order to strengthen the privacy and security of health information and to improve the workability and effectiveness of the Privacy Rule, Security Rule and Enforcement Rule...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Threats to Critical Medical Monitoring Devices

August 17, 2010 Added by:Danny Lieberman

A threat analysis was performed on a network of Windows-based embedded medical devices, which help prevent crisis situations through ongoing supervision of patient status, early detection of warning signs, and alert notifications of changes in patient condition...

Comments  (2)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Proposed Modifications to the HIPAA Rules Part Two

August 08, 2010 Added by:David Navetta

The proposed modifications would require organizations that currently issue notices of privacy practices to make material changes to those notices. The modifications do not appear to change the existing rules as to who is responsible for issuing the notice of privacy practices...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Proposed Modifications to the HIPAA Rules Part One

August 04, 2010 Added by:David Navetta

The Department of Health and Human Services issued its long-anticipated Notice of Proposed Rulemaking on Modifications to the Health Insurance Portability and Accountability Act Rules under the Health Information Technology for Economic and Clinical Health Act...

Comments  (0)

10e258c8d23d441b915c1b2333b6996a

HIPAA Compliance and Willful Neglect

July 18, 2010 Added by:Jack Anderson

The covered entity has a responsibility to get suitable assurance that their business associates are compliant and may request a risk assessment from them if reasonable and appropriate...

Comments  (1)

10e258c8d23d441b915c1b2333b6996a

HIPAA HITECH Fines and Fear of Lost Business

June 24, 2010 Added by:Jack Anderson

What has been suspected now has been confirmed - the cost of data breaches is substantial. Indeed, a report titled "2009 Annual Study: Global Cost of Data Breach" shines a very bright light on the actual cost of activities stemming from more than 100 breach incidents across multiple industry sectors, numerous organizations, and a handful of different countries.

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »