Archive for the HIPAA/HITECH Compliance Assurance Category

Microsoft ending support of Windows XP operating system

 If your healthcare practice runs any computers with Windows XP, you will face  considerably increased risk of data breaches and HIPAA violations in less than 24  hours.  Beginning April 8th, 2014 @ 11:59pm EST, Microsoft will no longer provide  security patches / updates for Windows XP, which is expected to magnify the

Read more

HIPAA compliance toolkit by HHS for Healthcare providers

A new security risk assessment (SRA) tool to help guide health care providers in small to medium sized offices conduct risk assessments of their organizations is now available from HHS. The SRA tool is the result of a collaborative effort by the HHS Office of the National Coordinator

Read more

HIPAA Violation Settlement by Skagit County Public Health Department

Skagit County, Washington, has agreed to settle potential violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy, Security, and Breach Notification Rules according to HHS.  Skagit County agreed to a $215,000 monetary settlement and to work closely with the Department of Health and

Read more

10 Myths and Facts about HIPAA and Meaningful Security Risk Analysis

Conducting  a security risk analysis to meet the standards of Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule is included in the meaningful use requirements of the Medicare and Medicaid EHR Incentive Programs. The following areas addresses some of the common myths about conducting

Read more

Do I need to address all identified security risks?

Before conducting meaningful security risk analysis of ePHI, it is important that practitioners clearly understand the terminologies: Risk is the level of exposure and potential impact of threats on the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI). Threats are all factors that can have a

Read more

Meaningful Use Risk Analysis Scope

Identifying the scope for Meaningful Use security risk analysis starts with understanding the flow of your electronic Protected Health Information.  According to HHS guidelines, the following personal information (18 identifiers), when combined with clinical data, becomes Protected Health Information (PHI), which is the scope of security risk

Read more

Update on Meaningful Use Stage 2 Security Risk Analysis

Close to 415,000 providers are participating in the popular CMS Medicare and Medicaid meaningful use incentive program. If your practice has not participated in the Medicare or Medicaid EHR Incentive Programs previously, please click on the link here  to learn how you can receive federal incentives. If

Read more

HIPAA/HITECH Final Rule is Here …

The U.S. Department of Health and Human Services (HHS) has announced a new rule to strengthen the privacy and security protections for health information established under the Health Insurance Portability and Accountability Act of 1996 (HIPAA). The final omnibus rule greatly enhances a patient’s privacy protections, provides

Read more
Page 2 of 212


Upcoming Events

  1. Protection from Phishing Attacks

    May 24 @ 1:00 pm - 2:00 pm
  2. HIPAA Hardening for G-Suite

    June 13 @ 1:00 pm - 2:00 pm