February 26, 2018
Briefings on HIPAA

Auditing of technical controls is increasingly important as both the level of use and technical sophistication of applications, hardware, and networking increase.

February 19, 2018
Briefings on HIPAA

If your organization is regulated by HIPAA, either as a covered entity (CE) or as a business associate (BA), you probably started a HIPAA training program years ago when the privacy and security rules mandating training were published. Whether old or recently created, your training program may not have met reasonable expectations to begin with. Now may be a good time to review, refresh, and refine that program to take it to a new level.

February 12, 2018
Briefings on HIPAA

As healthcare organizations navigate an increasingly complex regulatory environment, leaders at various levels—particularly HIM, release of information (ROI), compliance, finance, health information technology (HIT), privacy, and security—face unprecedented challenges.

February 5, 2018
Briefings on HIPAA

HIPAA lays out specific requirements for breach response and reporting. Although most organizations might understand these requirements in theory, compliance is often tricky in practice.

February 2, 2018
News & Insights

Fresenius Medical Care North American (FMCNA), a multistate clinic and provider network specializing in chronic kidney failure treatment, agreed to a $3.5 million HIPAA violation settlement.

February 1, 2018
News & Insights

Q: If a patient accidentally puts the paperwork in the trash or on the table, and the information on the paperwork is visible to other patients or family members, is it a HIPAA violation?

January 29, 2018
Briefings on HIPAA

Tips from this month's issue.

January 29, 2018
Briefings on HIPAA

This month's HIPAA Q&A answers readers' questions about cell phone use, disclosing PHI, and sharing information between providers.

January 28, 2018
Briefings on HIPAA

Take a look back at Briefings on HIPAA articles and topics you may have missed in 2017.

January 29, 2018
Briefings on HIPAA

As cyberattacks become more sophisticated and frequent, the old monitor logs or reliance on security information and event management tools just don’t cut it anymore; neither do old signature-based antimalware tools. Today, there are very sophisticated tools on the market that do a much better job of protecting the data and IT assets of covered entities and business associates.

Pages