Archive for the Events Category

10 Myths and Facts about HIPAA and Meaningful Security Risk Analysis

Conducting  a security risk analysis to meet the standards of Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule is included in the meaningful use requirements of the Medicare and Medicaid EHR Incentive Programs. The following areas addresses some of the common myths about conducting […]

Read more

6 Reasons Healthcare Systems Fear Social Media

There are over 5,700 registered hospital systems in the United States. A recent survey of hospitals  determined less than 1,600 systems participate in social media*. That means less than 30% of US  hospitals are involved in the social conversation. Why? For smaller hospital systems the answer could be very simple […]

Read more

Do I need to address all identified security risks?

Before conducting meaningful security risk analysis of ePHI, it is important that practitioners clearly understand the terminologies: Risk is the level of exposure and potential impact of threats on the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI). Threats are all factors that can have a […]

Read more

Dermatology Practice Settles Potential HIPAA Violations

Adult & Pediatric Dermatology, P.C., of Concord, Mass.,  has agreed to settle potential violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy,  Security, and Breach Notification Rules with the Department of Health and Human Services, agreeing to a $150,000 payment. The practice will […]

Read more

Meaningful Use Risk Analysis Scope

Identifying the scope for Meaningful Use security risk analysis starts with understanding the flow of your electronic Protected Health Information.  According to HHS guidelines, the following personal information (18 identifiers), when combined with clinical data, becomes Protected Health Information (PHI), which is the scope of security risk […]

Read more

Update on Meaningful Use Stage 2 Security Risk Analysis

Close to 415,000 providers are participating in the popular CMS Medicare and Medicaid meaningful use incentive program. If your practice has not participated in the Medicare or Medicaid EHR Incentive Programs previously, please click on the link here  to learn how you can receive federal incentives. If […]

Read more

Security Risk Analysis – Beyond satisfying HIPAA compliance requirement

A Security Risk Analysis may seem like just another compliance requirement, but it makes good business sense as well. Physician practices, clinics and small businesses that qualify as Business Associates under the new HIPAA Omnibus Final Rule are under tremendous pressure to meet very stringent compliance requirements as of September […]

Read more

Affinity health plan to settle potential violations of HIPAA for USD 1.2 million

Under a settlement with the U.S. Department of Health and Human Services (HHS), Affinity Health Plan, Inc. will settle potential violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy and Security Rules for $1,215,780. Affinity Health Plan is a not-for-profit managed care plan […]

Read more

Minimize Healthcare Data Breaches

Compliance with HIPAA/HITECH data breach regulations requires ongoing effort. With less funding and staff resources available for IT security, small practices are especially at risk. Due to the wide ranging sources of cyber threats, a practice needs to remain aware of all known data breach sources. In addition […]

Read more

Wellpoint to pay $1.7 million to settle potential HIPAA violations

The managed care company WellPoint Inc. has agreed to pay the U.S. Department of Health and Human Services (HHS) $1.7 million to settle potential violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy and Security Rules.  This case sends an important message to […]

Read more
Page 7 of 10« First...56789...Last »

Subscribe for Updates

Upcoming Events

  1. Managing the Risks of a Healthcare Data Breach

    April 6 @ 12:00 pm - 1:30 pm