GO
Archive by tag: CybersecurityReturn
RSS
By Bill Tolson Vice President, Archive360 Various government privacy regulations, including GDPR, CCPA, various state regulations, and the draft federal privacy bill currently in Congress (the Consumer Data Protection Act) all include some form of the right to data erasure, otherwise known as the right to be forgotten. Because the regulations don’t specify the details […]
Read More
| Categories: Compliance | Tags: Cybersecurity, CCPA, gdpr, personal information, PI | View Count: (105)
25

Giving Cybersecurity the “Cassandra Treatment”

posted on
By Jonathan Rusch Principal, DTG Risk & Compliance LLC In Greek mythology, the god Apollo gave Cassandra, the daughter of King Priam of Troy, the gift of prophecy, but then decreed that her prophecies would never be believed.  During the Trojan War, Cassandra predicted the fall of Troy – even the presence of men in […]
Read More
| Categories: Compliance | Tags: Cybersecurity, cybersecurity, data breach, IT, SEC | View Count: (246)
By Robin Singh, CFE, CCEP, HCCP Compliance and Fraud Control Lead, Abu Dhabi Government Website, email and social media are the three top marketing tools used by businesses. More than 50 percent of small businesses invest in a website to expand their reach while 17 percent of global retail sales was accounted by e-commerce. With more […]
Read More
| Categories: Compliance | Tags: Cybersecurity, compliance, data breach, gdpr, online business, privacy law | View Count: (150)
09

How to Avoid the Dangers of Identity Theft

posted on
By Larry Reed Technical Writer, Design Rush Identity theft occurs when a malicious third party deliberately assumes your identity for the purpose of obtaining some sort of an advantage over you, or otherwise cause you harm. Identity thieves may use your information to make purchases, apply for loans, file tax returns, take control of your […]
Read More
| Categories: Compliance | Tags: Cybersecurity, data encryption, data security, identity theft, phishing, two-factor authentication | View Count: (151)
20

Texting Patient Orders

posted on
Texting patient orders is easy. However, due to patient safety, security and privacy concerns, CMS and the Joint Commission prohibit it! Not only is texting patient information a gray area of the HIPAA law, it is also does not meet Medicare requirements. Texting and HIPAA Despite how tempting and convenient texting patient information may seem, it is a legal gray area. Therefore, if you are wanting to go down this path, consult with an attorney that is well versed in HIPAA. HIPAA is pretty serio...
Read More
| Categories: HIPAA Privacy and Security | Tags: Privacy, Security, CMS, CPOE, Cybersecurity, Encryption, HIPAA, Patient Privacy, Texting Patient, Texting Patient Information, Texting PHI | View Count: (478)
20

Password Security – HIPAA Tip

posted on
Password security is the bane of most healthcare organizations’ existence! Employees and providers groan every time they are required to change their passwords. Remembering complex passwords is also difficult, especially when you have multiple passwords to remember for all the programs and networks required to manage patient care. Writing passwords down and sharing passwords are common temptations to ease the pain of password management. However, not taking password security seriously is leavin...
Read More
| Categories: HIPAA Privacy and Security | Tags: HIPAA Tips, Security, Cybersecurity, HIPAA, Password | View Count: (5691)
17

CMS Memorandum on Texting Patient Orders

posted on
CMS has released a memorandum, Texting of Patient Information among Healthcare Providers. The Joint Commission released a similar recommendation in December 2016. CMS’s recent memo states that texting of physician orders is out of compliance with several Conditions of Participation and Conditions of Coverage, mainly the retention of record and content of record requirements. Entities are required to main the record in their original or legally reproduced form. Texts are not able to accomplish t...
Read More
| Categories: HIPAA Privacy and Security | Tags: Privacy, Security, CMS, CPOE, Cybersecurity, Encryption, HIPAA, Patient Privacy, PHI Texting, Texting Patient Information | View Count: (363)
17

HIPAA Tip – Sharing Passwords

posted on
Many small practices struggle with password security. The provider shares his login credentials with staff to make it easier for him to pull records from hospital stays in preparation for a clinic visit as well as so Medical Assistants can have the exam room computer on and ready for him when he walks in or so the nurse can chart for him. With how busy physicians are, these seem to be reasonable shortcuts to make his workflow more manageable. The problem is these practices are leaving the physic...
Read More
| Categories: HIPAA Privacy and Security | Tags: HIPAA Tips, Security, Cybersecurity, HIPAA, Password | View Count: (533)
17

Workstation Do’s and Don’ts

posted on
Secure your Workstations! Not surprisingly, workstation security is an important step in the overall health of your HIPAA Security program. In order for you to protect your patients’ data, you must protect the tools you use to access, transmit, and store their information. Secure Your Workstations You can secure workstations through a few simple steps: Each workstation has access controls enabled to restrict unauthorized users and programs from accessing ePHI Workstations should have automatic ...
Read More
| Categories: HIPAA Privacy and Security | Tags: Security, Cybersecurity, HIPAA, HIPAA Compliance, Passwords, Workstation Security | View Count: (627)
17

Is Your ePHI Encrypted?

posted on
You know that you have to secure your Protected Health Information. You also know that you should encrypt your PHI. But, do you know how expensive not having your PHI encrypted can be? Do you know the steps you should take to encrypt your devices and systems? The University of Texas MD Anderson Cancer Center (MD Anderson) knows exactly how expensive it is to fail to encrypt. MD Anderson experienced multiple HIPAA violations recently: Theft of an unencrypted laptop from a private residence of an ...
Read More
| Categories: HIPAA Privacy and Security | Tags: Privacy, Security, Compliance, Cybersecurity, HIPAA, HIPAA Compliance, Legislative News | View Count: (255)
Search
Blog Subscription
Name

Categories
Articles by Month
AIHC Facebook Feed
HHS
CMS - Centers for Medicare & Medicaid Services
Disclaimer

Articles written by the American Institute of Healthcare Compliance are under Copyright Notice: © 2016-2019 American Institute of Healthcare Compliance, Inc. All Rights Reserved. Views expressed through RSS feeds or remarks made on this blog or website are solely those of the original authors and other contributors and do not necessarily represent those of the American Institute of Healthcare Compliance and/or staff.