The HIPAA Omnibus Rule was established to identify and further outline accountability within the entities of healthcare regarding patient data. To understand the HIPAA Omnibus Rule and how it affects these entities, we need to understand who and what are the “moving parts” that make up the operation. Once we recap these key components, we’ll […]
18 HIPAA PHI Identifiers HIPAA regulations are in place to ensure that you protect and secure the patient data that as a healthcare business, you have access to and collect. The Department of Health and Human Services (HHS) has identified 18 patient identifier categories as it pertains to their guidance on satisfying the safe harbor […]
The post The 18 PHI (Protected Health Information) Identifiers appeared first on HIPAA Secure Now!.
Good Intentions Your workday in your healthcare business may start out with a clear plan of what you have ahead – you have your task list and work items to get through. But when it comes to cybersecurity, we need to be made aware of things in a timely and efficient manner. It may be […]
“We’re being audited!” Those words strike fear and uncertainty in most of us – especially if you are in healthcare. But what actually happens in a HIPAA audit? Will a government official show up unannounced with a briefcase and ask for you to produce every bit of your business’s HIPAA documentation while sequestering your team […]
The process of assessing your business when it comes to HIPAA Compliance will likely present you with the opportunity to review all the components that contribute to your professional structure and setup. This will likely include a website. Does a Website Fall Under HIPAA Regulations? If a website is used to collect and process protected […]
The post Business Websites: Do They Need to Be HIPAA Compliant? appeared first on HIPAA Secure Now!.
The Cybersecurity Program within the Department of Health and Human Services (HHS) came out this week with a strong warning for healthcare organizations about an “exceptionally aggressive” ransomware group that is targeting them. The Hive ransomware group is financially motivated and uses various methods to target organizations including phishing and attacking remote access/VPNs. They encrypt and steal data […]
Recently we went over the role of the HIPAA Privacy Officer and what responsibilities that individual would oversee, as well as what qualifications an ideal candidate would bring to the position. Additionally, HIPAA Regulations require that you formally identify a Security Officer in addition to a Privacy Officer, but they can be the same person. […]
Under the HIPAA Privacy Rule, there must be one individual who is identified as the Privacy Officer. What does that mean? Is it a paid job? What are the requirements? Are they the ones who will be accountable in the case of a violation or if a data breach should occur? Every covered entity and […]
Many people in healthcare make the incorrect assumption that their business won’t be a target for cybercriminals because they are “just a one-man show” or “aren’t part of a big network”. Neither way of thinking is wise, because when a cybercriminal is trying to compromise data or an entire network, every organization is valuable, and […]
Are you familiar with the IoT or the Internet of Things? This is the term that is applied to objects that are connected via the internet to collect and transfer data without any human interaction or intervention. This includes items like your smart television or even a refrigerator that is connected to an app on […]