News & Analysis

May 1, 2013
Briefings on HIPAA

Does your organization treat HIPAA compliance as kismet or karma?

May 1, 2013
Briefings on HIPAA

The HIPAA Privacy Rule de-identification ­standard-Section 164.514(a)-includes two ­methods by which health information can be designated as de-identified: expert determination and safe harbor.

May 1, 2013
Briefings on HIPAA

Q. A long-term care facility has deployed laptops that connect to a file server and are password ­protected. The laptops are not used to store PHI or other confidential data and are not removed from the facility. Do the laptop hard drives need to be encrypted?

April 1, 2013
Briefings on HIPAA

Many healthcare organizations face the challenge of protecting patient records and reducing the stress that results from a data breach.

April 1, 2013
Briefings on HIPAA

Citrix ShareFile offers a secure file-sharing solution that can be used to securely collaborate on documents, forward medical images to other healthcare providers, share treatment information with patients, and provide other ways to connect workforce members, healthcare entities, and individuals.

April 1, 2013
Briefings on HIPAA

Add another piece of evidence to the pile that shows data breaches in healthcare organizations are common and human error is often to blame.

Pages