GO
Archive by month: 2018-8Return
RSS
Texting as a Healthcare Provider: Risks, Uses, and HIPAA Compliance
For many people, texting to communicate with others is almost second nature. However, if you are a healthcare professional or work with protected health information, think twice before using your phone to quickly communicate or obtain information for work. Mobile device security is a requirement for all HIPAA covered entities and enforcing compliance in mobile device use is an effective way to mitigate risk and avoid HIPAA breaches.
Read More
| Categories: AIHC Professional Articles, HIPAA Privacy and Security | Tags: HHS, Joint Commission, ONC, Providers, HIPAA, Security, Privacy, HIPAA Covered Entities, Compliance, Healthcare Employees, Texting, Mobile Devices, Training | View Count: (640)
Twenty-two years ago this month, the U.S. Congress enacted the Health Insurance Portability and Accountability Act of 1996 (HIPAA). The federal Privacy, Security, and Breach Notification Rules implemented under HIPAA, and administered and enforced by the HHS Office for Civil Rights (OCR), continue to serve as the national foundation of protections for individually identifiable health information, and of individuals’ rights with respect to their information, including the right to see and obtain...
Read More
| Categories: Health IT | Tags: Privacy and Security of EHRs | View Count: (193)
28

Let's talk about cyberbullying

posted on
Last week, the FTC joined several other agencies and the First Lady for an important conversation about cyberbullying. Cyberbullying is a tough subject for both parents and educators. That’s why most of our materials are built around having conversations, in small doses, and in your own language. Here are some easy ways to start these conversations:
Read More
| Categories: Cybersecurity | Tags: | View Count: (213)
27

Selling your car? Clear your personal data first.

posted on
Is a new car in your future? You might first have some unfinished business with your old one. While you’re cleaning out your personal items, think about the personal information stored in the car’s electronic system. 
Read More
| Categories: Cybersecurity | Tags: | View Count: (217)
23

The Stark Law: Waivers for Quality

posted on
NCQA BlogNCQA Blog - “Value over volume.” NCQA promotes it. We have for a very long time. It’s why you hear us talk so much about common sense health objectives like Accountable Care Organizations (ACOs), and other Alternative Payment Models that reward the value. Yet, there are some regulatory relics that can slow the march of the value mission. […]The Stark Law: Waivers for QualityAlec Bose
Read More
| Categories: Health Care Plans | Tags: | View Count: (278)
23

Avoid hurricane relief charity fraud

posted on
Hurricane Lane is a Category 4 churning in the Pacific with an eye toward the Hawaiian islands. If you haven’t made storm preparations, now is the time. The FTC has information to help you prepare for, deal with, and recover from the long-term impacts of a weather emergency. But how about the rest of us ready to help with donations after the hurricane? You should know about how to avoid hurricane relief charity fraud.
Read More
| Categories: Cybersecurity | Tags: | View Count: (198)
NCQA BlogNCQA Blog - NCQA has a long history of supporting states that use managed care in their Medicaid programs. Last week, North Carolina became the 41st state to take this step, and they will be relying on our Health Plan Accreditation (HPA) program to ensure that the care provided is high quality and in-step with the latest medical […]North Carolina Managed Care Mandates NCQA Accreditation!Alec Bose
Read More
| Categories: Health Care Plans | Tags: | View Count: (226)
21

How to avoid a Bitcoin blackmail scam

posted on
“I know about the secret you are keeping from your wife and everyone else. You can ignore this letter, or pay me a $8600 confidentiality fee in Bitcoin”. It’s enough to send shivers down anyone’s spine, but these chilling words are part of a new scam targeting men.
Read More
| Categories: Cybersecurity | Tags: | View Count: (195)
20

Back to school: Protect your child’s information

posted on
Many school forms require personal and sensitive information. Here are some tips for keeping your child’s personal information safe — from pre-school through college.
Read More
| Categories: Cybersecurity | Tags: | View Count: (517)
17

School shopping can be a teachable moment

posted on
As summer winds down, it’s time for back-to-school shopping. Here are some tips to help you save time and money.
Read More
| Categories: Cybersecurity | Tags: | View Count: (397)
Page 1 of 3 FirstPrevious [1]23 Last
Search
Blog Subscription
Name

Categories
Articles by Month
AIHC Facebook Feed
HHS
CMS - Centers for Medicare & Medicaid Services
Disclaimer

Articles written by the American Institute of Healthcare Compliance are under Copyright Notice: © 2016-2019 American Institute of Healthcare Compliance, Inc. All Rights Reserved. Views expressed through RSS feeds or remarks made on this blog or website are solely those of the original authors and other contributors and do not necessarily represent those of the American Institute of Healthcare Compliance and/or staff.