Providing HIPAA compliance auditors with complete documentation of every aspect of your privacy and security strategy, along with evidence of corrective action taken to mitigate risks, is essential, says consultant Cliff Baker.
Whether you're preparing for the upcoming HIPAA compliance audits, pondering a move to cloud computing or developing a social media policy, it pays to get privacy and security tips from experts in the field.
Conducting a thorough self-assessment is the best way to prepare for the upcoming HIPAA privacy and security rule compliance audits, regulators and other experts advise.
The American National Standards Institute has begun accepting applications from organizations that want to be accredited to certify electronic health records software for the HITECH Act EHR incentive program.
Preliminary results of our inaugural Healthcare Information Security Today survey, which is still open for participation, show that only about half of healthcare organizations have a plan in place to comply with the HITECH Act breach notification rule.
Banks and commercial customers are more often working together, enabling them to catch and stop fraudulent requests for funds transfers before commercial accounts are drained.
A federal proposal that would require healthcare organizations to provide patients with a report listing everyone who has electronically accessed their records needs revamping, two regulatory experts agree.
Having complete documentation of every aspect of your privacy and security strategy is the best way to prepare for a HIPAA audit, says consultant Cliff Baker.
As of Aug. 22, 306 major health information breaches affecting a total of almost 11.7 million individuals were included in the official federal tally. Fourteen incidents affecting a total of about 270,000 were added since July 22.
When it comes to banning the use of social media in the workplace, Jenny Corotis Barnes, assistant general counsel at Ohio State University Medical Center, has a strong opinion: Forget about it.
We're pleased that two members of Congress have asked the Government Accountability Office to study whether federal regulators are adequately addressing the security risks involved in using wireless medical devices.
Has our financial system's attention focused so much on cyberthreats that it's forgotten to lock down controls to prevent low-tech schemes? In a nutshell, yes.
A federal proposal to require healthcare organizations to provide patients with access reports listing everyone who has electronically viewed their information is impractical, says Dan Rode of the American Health Information Management Association.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.