Demonstrating that ePHI encryption meets the safe harbor requirements may be more difficult than it seems when planning for that inevitable breach. Full disk encryption may not be enough. Many healthcare users believe encryption software installed on mobile devices and desktops will avoid the potentially damaging breach notification. The question is: Can you prove ePHI was encrypted at the time the device was lost, accessed, or stolen? Absio Corporation may have the answer.
Chasing down information on incomplete records can be overwhelming and a lost cause. What do you do when a medical record is incomplete 30 days after discharge (or 14 in California’s case) and thus does not meet regulatory standards?
It was a gorgeous afternoon and a perfect day to hold an outdoor summer barbecue for the HIM department at Central Peninsula Hospital in Soldotna, Alaska.