News & Analysis

March 1, 2010
Briefings on HIPAA

Don't wait for OCR to publish all the HITECH implementation rules before taking action, Apgar said during "Business Associate Action Plan: Comply with HITECH by February Deadline," a recent HCPro audio conference.

February 1, 2010
HIM Briefings

On August 19, 2009, HHS released its interim final rule on breach notification of unsecure protected health information (PHI) and the acceptable methods for covered entities (CE) and business associates (BA) to encrypt and destroy patient records to prevent breaches.

January 2, 2010
Briefings on HIPAA

Booz Allen Hamilton, a McLean, VA–based firm that was commissioned in 2008 by the Office of the National Coordinator for Health Information Technology to research medical identity theft in the United States, says all facilities can adopt the following strategies:

January 2, 2010
Briefings on HIPAA

SenditCertified offers a unique solution: It supports the encryption of transmitted PHI that meets National Institute of Standards and Technology (NIST) standards. SenditCertified also supports other security safeguards and provides practical tools to assist in avoiding a breach of PHI, as well as related business tools.

January 2, 2010
Briefings on HIPAA

Is there any regulation that defines the retention period for electronic health record (EHR) or electronic medical record audit logs?

January 1, 2010
Briefings on HIPAA

Major breaches of patient information in 2009 break down into three types: snoopers, hackers, and those involving large quantities of data. Let's examine the top breach of each type and find out what facilities can do to prevent similar problems.

Pages