News & Analysis

September 1, 2014
HIM Briefings

The HIPAA Security Rule requires implementing risk management tools and techniques to adequately and effectively safeguard ePHI. Risk analysis and management provides the foundation for an organization's Security Rule compliance efforts, and reinforces its strategy to protect the confidentiality, integrity, and availability of vital information.

September 1, 2014
HIM Briefings

Q: Are there any penalties for sending an unencrypted email containing PHI to the intended recipient? Would this just be a violation of the CE's policy and not a privacy breach under HITECH?

September 1, 2014
Briefings on HIPAA

Tips from this month's issue

September 1, 2014
Briefings on HIPAA

The OCR continues to crack down on HIPAA breaches, but it also paused to take a look back at past incidents in two annual reports to Congress. The reports, which were released in May, summarize the reported 2011?2012 HIPAA breach and compliance activities as required by the HITECH Act. Although the data presented in the reports details the events from prior years, the causes of the breaches reported to and investigated by OCR are still relevant?and problematic?for healthcare organizations today.

August 1, 2014
Briefings on HIPAA

Cybersecurity threats, cloud computing, proliferation of mobile device technology, and the pervasiveness of social media directly affect healthcare operations and privacy and information security programs?as does the explosion of data, which makes safeguarding information assets increasingly more important and difficult.

August 1, 2014
Briefings on HIPAA

When you think about a data breach, you probably think about things like maximum fines and penalties of $1.5 million, willful neglect, corrective action plans, and so forth, right? Well, think again.

Pages