As HIPAA privacy and security officers gear up for another year of compliance, it’s always a good time to rethink training. How often should you train? How should you tailor content? How should you assess learning competency?
In its fall 2021 cybersecurity newsletter, OCR said it’s a great time for organizations to revisit the protections they have in place for their legacy systems.
It’s almost a new year. And for HIPAA security officers, that means it’s time to reflect on the year that was and also look forward to the next 12 months. One way to do that is to sharpen their toolkit of skills and traits.
Learn about the most important parts of the 21st Century Cures Act: Interoperability, Information Blocking, and the ONC Health IT Certification Program final rule for HIPAA compliance officers.
In its July newsletter, OCR announced a collaboration with the HHS Office of the National Coordinator for Health Information Technology (ONC) to seek user feedback and improvement suggestions on its Security Risk Assessment (SRA) Tool.
H.R. 7898 became law on January 5, 2021, and amended the Health Information Technology for Economic and Clinical Health (HITECH) Act to require the secretary of HHS to consider certain recognized security practices of covered entities and business associates when making certain determinations, and for other purposes.
With the first month of fall arrived, it’s time to start thinking of the year ahead—and, of course, to finish the year strong. We’ve gathered some HIPAA compliance tips to consider while getting through the final third of the year and building some compliance momentum heading into 2022.
HHS recently issued its Summer 2021 OCR Cybersecurity Newsletter, covering the topic of controlling access to ePHI. HHS officials cited a Verizon 2021 Data Breach Investigations report that found 61% of analyzed data breaches in the healthcare sector were perpetrated by external threat actors and 39% were carried out by insiders.