HIPAA Compliance
31 views | +0 today
Follow
HIPAA Compliance
Blogging about HIPAA, HITECH and health IT
Your new post is loading...
Your new post is loading...
Scooped by Praetorian Guard
Scoop.it!

Leading Causes of Data Breaches in Healthcare

Leading Causes of Data Breaches in Healthcare | HIPAA Compliance | Scoop.it

6,294,690 patient records have been breached in the US between January and October 2013 containing information such as patient names, SSN, health and credit card information. Portable devices being lost, discarded or stolen as well as insider threats come up as the top reasons why breaches occurred. Although there are 13 states without any reported incidents, the situation in the rest of the states looks rather grave.


more...
No comment yet.
Scooped by Praetorian Guard
Scoop.it!

Highlights from the 2013 Privacy and Security Forum

Praetorian Guard's insight:

On 23-24 September was held the 2nd annual Privacy and Security Forum which covered a wide range of topics regarding HIPAA compliance, security and privacy of PHI. Read more about the participation of Leon Rodriguez, Jennings Aske and Joy Pritts in the event.

more...
No comment yet.
Scooped by Praetorian Guard
Scoop.it!

Omnibus Rule’s Impact on Business Associates

Learn how the Omnibus Final Rule affects business associates and business associate agreements.
more...
No comment yet.
Scooped by Praetorian Guard
Scoop.it!

Recent HIPAA Data Breaches

The number of healthcare data breaches has been increasing. According to the Third Annual Study on Patient Privacy 94 percent of the audited organizations have had one breach incident in the past two years.
Praetorian Guard's insight:

Read about some of the HIPAA data breaches that occurred the second half of 2012.

more...
No comment yet.
Scooped by Praetorian Guard
Scoop.it!

What to Know About Patients Rights Under HIPAA?

According to HIPAA regulations, all patients are provided with rights regarding their PHI (Protected Health Information).

- Right to a Notice of Privacy Practices

- Right to Receive Confidential Communication

- Right to Access, Inspect and Copy PHI

- Right to Amend PHI

- Right to an Accounting of Disclosures of PHI

- Right to Request Restrictions on Use and Disclosure of PHI

 

In this article, we will provide a more detailed description of what those patient rights mean.

more...
No comment yet.
Scooped by Praetorian Guard
Scoop.it!

Initial HIPAA Audit Results and What’s Next

The OCR (Office of Civil Rights) has piloted an audit program to perform up to 115 audits of covered entities to access HIPAA privacy, security and breach notification performance. The HIPAA audits have been conducted since November 2011 and will conclude in December 2012. Today, we will talk about the initial audit results and what has been planned to happen next in the program.

more...
No comment yet.
Scooped by Praetorian Guard
Scoop.it!

Facts about Healthcare Compliance Audits

Facts about Healthcare Compliance Audits | HIPAA Compliance | Scoop.it
The article explains what healthcare compliance audit is and also gives details about the HIPAA Audit Program, its enforcement actions and the conducted procedure.
more...
No comment yet.
Scooped by Praetorian Guard
Scoop.it!

Final Rules for Stage 2 Meaningful Use: an Overview

Final Rules for Stage 2 Meaningful Use: an Overview | HIPAA Compliance | Scoop.it

In 2011 the federal Medicare and Medicaid EHR Incentive Programs started, which provide incentive payments to eligible professionals (EPs), hospitals, and critical access hospitals (CAHs) in case they successfully integrate and prove meaningful use of electronic health records in their practice. The programs are divided into three stages, the first one of which sets the basic functionalities of what electronic health records should include. On August 23 were released the final rules of Stage 2 Meaningful use. This article will give you a basic review of the rules, including the Stage 2 timing and the new core objectives and measures.

more...
No comment yet.
Scooped by Praetorian Guard
Scoop.it!

Why Using Healthcare Compliance Monitoring Software Is Beneficial?

Why Using Healthcare Compliance Monitoring Software Is Beneficial? | HIPAA Compliance | Scoop.it

The risks of noncompliance with HIPAA cannot be neglected – apart from the possibility of losing public trust, damaging your reputation and having losses from lawsuits, there’s the HITECH. With the creation of The Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 compliance obligations have been boosted and enforcement penalties strengthened.

 

So what should healthcare organizations do? A recommended step for ensuring compliance with HIPAA’s Security Rule standards is implementing compliance monitoring software. We are going to mention some of its most important benefits for covered entities.

more...
No comment yet.
Scooped by Praetorian Guard
Scoop.it!

Stage 2 Meaningful Use Still In Motion Despite Shutdown

Praetorian Guard's insight:

CMS will continue to process attestations and incentive payments for the 'Meaningful Use' program despite the government shutdown. 1st October was the start date for Stage 2 of the program for hospitals but there's been some growing concern regarding the timeline of Stage 2 among vendors and providers.

more...
No comment yet.
Scooped by Praetorian Guard
Scoop.it!

HIPAA Enforcement Strengthens with Approaching Final Rule Deadline

With the upcoming Omnibus Final Rule deadline, OCR's penalties get even more stringent. Let’s take a look at some of the latest cases of HIPAA violations.
more...
No comment yet.
Scooped by Praetorian Guard
Scoop.it!

HIPAA Omnibus Final Rule on Privacy and Security

Read about the omnibus final rule and the latest modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules.
more...
No comment yet.
Scooped by Praetorian Guard
Scoop.it!

What is HIPAA 5010?

Praetorian Guard's insight:

All covered entities (healthcare providers, plans and clearing houses) that submit administrative transactions electronically must use the Version 5010 transactions. The shift from the Version 4010 to Version 5010 transactions occurred in regulations issued by CMS in 2009. Today, we will give you an idea about the upgraded HIPAA version.

more...
No comment yet.
Scooped by Praetorian Guard
Scoop.it!

Healthcare Risk Assessment - Exemplary Steps

HIPAA regulations require covered entities to maintain appropriate administrative, technical, and physical safeguards. Specifically, the Security Rule provides guidance to proper implementation assistance of the two main standards – healthcare risk analysis and risk management. According to the Security Rule, a risk analysis should be conducted and documented but it does not require a specific format. In this article we will present several exemplary steps of how to successfully conduct a risk assessment.

more...
No comment yet.
Scooped by Praetorian Guard
Scoop.it!

HIPAA Compliance - Audit Preparation Tips

In this article, we will talk about some good practices that healthcare organizations can follow in order to successfully prepare for a HIPAA compliance audit:

 

- assigning officials

- reviewing internal policies and procedures

- conducting a risk assessment

- internal auditing

- training hospital staff on compliance 

more...
No comment yet.
Scooped by Praetorian Guard
Scoop.it!

HITECH, Stage 2 Final Rules and the Public Reaction

HITECH, Stage 2 Final Rules and the Public Reaction | HIPAA Compliance | Scoop.it
The article focuses on HITECH act and Stage 2 Final Rules, including requirements regarding assessment and encryption and the reaction among some of the consumer advocates, security experts and hospitals.
more...
No comment yet.
Scooped by Praetorian Guard
Scoop.it!

Data Breaches in Healthcare and How to Prevent Them with Monitoring Software

Data Breaches in Healthcare and How to Prevent Them with Monitoring Software | HIPAA Compliance | Scoop.it

Nowadays, data breaches are a quite common event. The causes of data security breaches can vary from a hacker attack to employee theft of health information from the network or theft of paper documents, laptops, portable disks, hard drives that contain ePHI.  According to the Identity Theft Resource Center (ITRC) report 2012 key findings, 213 breaches were recorded for the first six months of 2012. Data breaches in the healthcare industry currently are 27% of the total breach incidents, which is a drastic increase over the 17% reported for the same period in 2011.

 

Let’s take a quick look at some of the largest data breaches in healthcare for 2012 to get a better picture of what has exactly happened and then see how network management software can help.

 

 

more...
No comment yet.
Scooped by Praetorian Guard
Scoop.it!

What Is HIPAA Compliance And How Can Network Management Software Help You Achieve It?

The U.S. Health Insurance Portability and Accountability Act (HIPAA) of 1996 set the national regulations for protecting confidential patient health data and provided guidelines regarding the privacy and integrity of electronic protected health information (ePHI).

 

The primary standards of HIPAA are the Privacy and Security Rules. The HIPAA Privacy Rule deals with the protection of health information held by covered entities and give certain rights to patients regarding their health data. The HIPAA Security Rule sets administrative, technical, and physical standards for electronic Protected Health Information that need to assure its confidentiality, protection and integrity.

 

Achieving compliance with the HIPAA regulations can be successfully done with the use of network management software that can mitigate the compliance risk, tighten security and provide the necessary reports to prove compliance to auditing organizations.

more...
No comment yet.