fbpx

HIPAA Archives

  • If you use an on-premises Microsoft Exchange Server, it is important to reach out to your IT Support immediately to be sure updates are installed to boost your cybersecurity and protect against recently discovered critical security vulnerabilities. The vulnerabilities allow an attacker to compromise your network and steal information, encrypt data for ransom, or evenRead more…

  • Last month HHS released a set of proposed upcoming changes to the HIPAA Privacy Rule. Anyone can review and submit comments about the proposed changes until March 22, 2021. After that, HHS will review all comments and make any changes they feel are necessary and issue a final rule that will require compliance. This canRead more…

  • When a minor becomes an adult, they become the owner of their medical record.  Here are a couple of things to consider: When does a minor become an adult; What does the practice need to do to ensure proper handling of the record according to HIPAA. A minor can become an adult in several ways.Read more…

  • In March, the HHS Office of the National Coordinator for Health Information Technology (ONC) issued new rules to prevent health care providers, developers of certified health IT, and others in the healthcare industry from engaging in activities that block a patient’s access to their electronic health information. Building on the 21st Century Cures Act, theseRead more…

  • Keeping track of your equipment, office furniture, and similar items for financial purposes is a routine part of business. It is tough to protect something if you do not know where it is or that it even exists. That is why making an inventory list of devices and software your office owns and uses, particularlyRead more…

  • Keeping track of your equipment, office furniture, and similar items for financial purposes is a routine part of business. It is tough to protect something if you do not know where it is or that it even exists. That is why making an inventory list of devices and software your office owns and uses, particularlyRead more…

  • Pretending to be someone else over the phone was a lot easier before caller-ID was invented. People took advantage of it in fun ways (like making prank phone calls after school), and others did in inappropriate and illegal ways. After caller-ID became a standard feature, as with most technologies, ways to bypass or disable itRead more…

  • Dealing with a minor’s medical records can be a minefield when a child is from a blended family or the parents have a contentious divorce going. Things get especially sticky when you add in stepparents and grandparents, and when a minor controls all or a portion of their own records. It’s a good time toRead more…

  • HIPAA requires regular monitoring and review of user logins and activity in software and on networks.  These reports are generally referred to as audit logs. They can help identify system performance issues as well as security incidents and breaches. You might think of them as a very detailed internet browser history report. All machines, networks,Read more…