February 1, 2012
Briefings on HIPAA

When Mac McMillan, CISSP, CEO of CynergisTek in Austin, TX, picked up the phone recently, he had a very nervous hospital administrator on the other end.

February 1, 2012
Briefings on HIPAA

HIPAA and HITECH have resulted in a whole new career for Tom Dumez, CHP. As human resources director at a records management company, Dumez's job in the last few years has taken a new direction-training others how to comply with HIPAA.

February 1, 2012
Briefings on HIPAA

Got HIPAA compliance questions? We've got answers.

January 1, 2012
Briefings on HIPAA

Q Can a mental health and alcohol and chemical dependency treatment health center e-mail and text PHI between healthcare providers and between field caseworkers and patients? We have implemented a secure messaging solution, but it is the organization's policy to prohibit sending PHI via e-mail or text.

January 1, 2012
Briefings on HIPAA

It's 2012, and that means it's time to make some ­resolutions to kick off the new year.

January 1, 2012
Briefings on HIPAA

One of the three foundational security requirements is availability-the ability to access data when you really need it. Data accessibility is considered sound security practice and is a requirement per the HIPAA Security Rule (45 CFR 164.306[a][1]). If a data storage device fails, you can lose access to your patients' or health plan members' PHI. This could adversely affect patient care and service to health plan members.

January 1, 2012
Briefings on HIPAA
December 1, 2011
Briefings on HIPAA

Q Is it permissible to fax PHI to a long-term care ­facility that also operates an independent living facility and an assisted living facility?

December 1, 2011
Briefings on HIPAA

The dice were rolled and, surprise, you got a letter in the mail from the OCR. You were selected for a HIPAA compliance audit-one of 150 the OCR will conduct in 2012 via its contractor KPMG, LLP.

December 1, 2011
Briefings on HIPAA

HIPAA privacy and security officers often spend a lot of time and effort protecting their healthcare organization from the threat posed to its PHI by outsiders. Most organizations do a pretty good job of recognizing the threats to critical assets from outside their own perimeter. However, they must also not ignore the threat that comes from those inside the organization, said Randall F. Trzeciak, who spoke at the Fifth HIPAA Summit West in September in San Francisco.

Pages