The Number One HIPAA Requirement – the HIPAA Risk Analysis
HIPAA Risk Analysis and Your Critical Starting Point The HIPAA Risk Analysis is so important that it is the first item defined in the HIPAA Security Rule, a requirement since 2005. It forms the basis...
View ArticleHIPAA Security Rule – Wrong Way, Go Back!
If you are going in the wrong direction, every step you take to comply with the HIPAA Security Rule will be wrong. This is the second in a series of articles to help you understand what you must to do...
View ArticleMake Training Easy to Avoid a HIPAA Penalty
A HIPAA Penalty Can Be Avoided Using Key Online Tools and Training Technology can only go so far in protecting data and avoiding a HIPAA penalty, but your employees have an almost limitless ability...
View ArticleHIPAA Compliant Practices Earn Meaningful Use Money
Being HIPAA Compliant is not a Snapshot in Time Meaningful Use requires you to protect patient data. Protecting patient information is like protecting patient safety; it is something you have to do...
View ArticleHIPAA Compliance and Meaningful Use Tech Tips
HIPAA Compliance Tech Tips Part 1 of 2 Technical Requirements You May Not Understand HIPAA Compliance can be a mystery. It can be even more mysterious when you don’t understand technology. When you...
View ArticleWhen is a Lawyer or Accountant a HIPAA Business Associate?
HIPAA Business Associate Role is Based on Services The question about a lawyer or an accountant being a HIPAA Business Associate is directly related to several sections of the HIPAA Security Rule...
View ArticleWill a Meaningful Use Audit Ruin Your Career?
Will Your Job Survive a Meaningful Use Audit? The Meaningful Use program can help offset technology costs or could cost your hospital or practice millions of dollars. It could also cost you your...
View ArticleJust 12 weeks to get rid of Windows XP
No HIPAA or Meaningful Use Compliance with Windows XP Time’s up. On April 8, 2014, Microsoft is ending security updates and patches for Windows XP and Office 2003. Just having a Windows XP computer on...
View ArticleCan a Terminated User Cause a Breach ?
How Good Is Your Terminated User Checklist? Having a former employee access electronic Protected Health Information (ePHI) is a data breach. In today’s computing environment terminating employee...
View ArticleHigh HIPAA Hopes
September Survey Reflects Optimistic Compliance Outlook A recent survey conducted by 4Medapproved, sought the opinions of the medical community regarding their current HIPAA compliance status. One...
View Article
More Pages to Explore .....