News & Analysis

April 1, 2012
Briefings on HIPAA

Q. Please explain in an understandable way for nontechnical individuals what level of encryption is needed for e-mail to be considered secure as defined in the interim final breach notification rule.

April 1, 2012
Briefings on HIPAA

Mac McMillan, CISSM, has an insider’s look at what it’s like to undergo a HIPAA compliance audit.

April 1, 2012
Briefings on HIPAA

Navigating the new world of social media is challenging for many professions, but perhaps none more so than the medical profession, where physicians and other healthcare professionals must balance a tell-all online culture with the HIPAA Privacy Rule's mandate to protect patient privacy.

April 1, 2012
Briefings on HIPAA

All covered entities (CE) face the question, “Will the data be there when I need it?”

April 1, 2012
Briefings on HIPAA

How well you train your workforce members will determine whether you score points or encounter problems during a HIPAA compliance audit.

March 9, 2012
Briefings on HIPAA

If your healthcare organization hasn’t yet completed a security risk analysis, you just got another reason to conduct one.

Pages