When an organization discovers a hacker infiltrating the network, the natural response is to act quickly and shut down everything.
Of course, it’s important to show urgency in a response, but urgency without a well-constructed, well-rehearsed plan won’t do an organization any good. In fact, it may even exacerbate the issue.
Q: Under what circumstances can a CE disclose PHI to family and friends of the patient? Does the patient always need to verbally consent to the disclosure? For example, if a patient brings a friend or family member with him or her into the emergency room, should the doctor assume that the patient is OK with the friend or family member being privy to PHI?
Q: We recently took a survey and many of our employees admitted to saving their passwords in a Word® document or a Notes® file on their phone. Is this riskier than having passwords written down on paper and stored in a safe place at work or home? How can we discourage employees from writing down their passwords anywhere?
Q: Following a breach, many organizations post a breach notification letter to their website. Is there a particular spot on the site that it must be posted? Can the link to the notification letter be posted anywhere on the homepage?