March 1, 2015
Briefings on HIPAA

The healthcare industry is continuously evolving, and health information technology (HIT) is changing with it. Organizations should take advantage of the technology available to improve healthcare operations but must be aware of the risks that HIT can present.

March 1, 2015
Briefings on HIPAA

Secure text messaging presents challenges when it comes to ease of use and communicating with anyone who hasn't installed a like secure texting app. Until recently, secure texting was possible, but only if the sender and recipient both used the same mobile app. TigerText unveiled Fast Deploy® in 2014, and it's a game changer.

March 1, 2015
Briefings on HIPAA

Q: How should an organization handle patient requests to withhold PHI from the patient's insurance company?

March 1, 2015
Briefings on HIPAA

A business case for resourcing a compliance assurance program for privacy and security should be possible solely on the basis of the need to respond to complaints made directly to a covered entity (CE) (or business associate (BA) acting as an agent of a CE). However, despite stepped-up enforcement and periodic audits required by HITECH, industry experts still anticipate that a more proactive process for compliance may not be taken until an untoward event occurs. Consequently, other avenues for substantiating the importance of privacy and security measures are necessary and readily available. Information privacy and security officials may find it necessary to go beyond information about HIPAA Privacy and Security Rule enforcement in making the business case. Monitoring the general security industry and relating those risks to healthcare privacy and security are important when doing so. Consider the following:

March 1, 2015
Briefings on HIPAA

Tips from this month's issue.