GO
Archive by tag: SecurityReturn
RSS
What You Need to Know About Email and HIPAA Compliance
Many of us use email so regularly that we can sometimes forget about the potential risks associated with it. When it comes to healthcare, there are 152 HIPAA breaches currently being investigated by the OCR that have cited email as the breach location. If you need to send health information to patients or other providers, how do you determine if email would be compliant with your organization’s HIPAA privacy and security requirements?
Read More
| Categories: AIHC Professional Articles, Cybersecurity, HIPAA Privacy and Security | Tags: HHS, OCR, ONC, NIST, FTC, Providers, HIPAA Covered Entities, HIPAA, Security, Privacy, Compliance, Cyberattacks, Health IT, Healthcare Employees, Training | View Count: (457)
07

How Blockchain Can Enhance Healthcare Cybersecurity

posted on
How Blockchain Can Enhance Healthcare Cybersecurity
When patients come to you for treatment or medical care, they expect that you will keep their information secure and protected. With an ever-changing cybersecurity environment, you always need to be on the lookout for new tools, like blockchain, that can help keep patients’ data secure at your organization. The important question is: Is blockchain capable of providing the security needed to protect patient health information?
Read More
| Categories: AIHC Professional Articles, Health IT, HIPAA Privacy and Security, Cybersecurity | Tags: HHS, ONC, NIST, CDC, MIT Media Lab, HIPAA, Security, Privacy, Cyberattacks, Blockchain, Health IT, EHR, Healthcare Employees, Training, Healthcare Payers, Insurance Coverage, Audit | View Count: (555)
By Bill Tolson Vice President, Archive360 Various government privacy regulations, including GDPR, CCPA, various state regulations, and the draft federal privacy bill currently in Congress (the Consumer Data Protection Act) all include some form of the right to data erasure, otherwise known as the right to be forgotten. Because the regulations don’t specify the details […]
Read More
| Categories: Compliance | Tags: Cybersecurity, CCPA, gdpr, personal information, PI | View Count: (101)
25

Giving Cybersecurity the “Cassandra Treatment”

posted on
By Jonathan Rusch Principal, DTG Risk & Compliance LLC In Greek mythology, the god Apollo gave Cassandra, the daughter of King Priam of Troy, the gift of prophecy, but then decreed that her prophecies would never be believed.  During the Trojan War, Cassandra predicted the fall of Troy – even the presence of men in […]
Read More
| Categories: Compliance | Tags: Cybersecurity, cybersecurity, data breach, IT, SEC | View Count: (235)
Heart Health and Compliance: Reflections for American Heart Month
February is a month filled with hearts. With the endless rows of heart-shaped boxes at the store, internal debates about the health merits of chocolate, and reminders of American Heart Month, you cannot escape discussions surrounding this important organ. Healthcare providers can keep hearts healthy for Valentine’s Day this year by working with patients to help manage their risk factors for heart disease, like high blood pressure or cholesterol.
Read More
| Categories: AIHC Free CEU Articles, AIHC Professional Articles, Mental and Physical Health | Tags: CDC, Department of Veterans Affairs, National Institutes of Health, Providers, HIPAA Covered Entities, HIPAA, Security, Privacy, Compliance, CDI, Coding, ICD-10, ICD-10-CM, Mobile Devices, mHealth, EHR, Continuing Education, Healthcare Employees, Training, Heart Health | View Count: (475)
Care, Coding, and Cybersecurity: Healthcare Applications of Artificial Intelligence
In some ways, AI can almost be like an employee, requiring training before fulfilling its purpose. In healthcare, AI has the potential to support everything from patient care to cybersecurity. As opportunities for healthcare applications of AI increase, it becomes even more important that both the individuals developing these programs and people using AI programs at work have obtained the training needed to ensure success.
Read More
| Categories: AIHC Professional Articles, Cybersecurity, Health IT | Tags: Department of Veterans Affairs, Agency for Healthcare Research and Quality, FDA, Small Business Innovation Research, Government Accountability Office, CMS, OIG, Providers, HIPAA Covered Entities, HIPAA, Security, Compliance, Coding, Billing, ICD-10, ICD-10-CM, ICD-10-PCS, Cyberattacks, Artificial Intelligence, Texting, Healthcare Employees, Training, Diabetes, Mental Health | View Count: (456)
By Robin Singh, CFE, CCEP, HCCP Compliance and Fraud Control Lead, Abu Dhabi Government Website, email and social media are the three top marketing tools used by businesses. More than 50 percent of small businesses invest in a website to expand their reach while 17 percent of global retail sales was accounted by e-commerce. With more […]
Read More
| Categories: Compliance | Tags: Cybersecurity, compliance, data breach, gdpr, online business, privacy law | View Count: (146)
Data and Compliance: Tools for Fighting Opioid Addiction
Healthcare providers and policy makers are always looking for new ways to address the opioid epidemic. One of the five main strategies being employed by the Department of Health and Human Services (HHS) to fight this issue is “better data” about opioid use, misuse, and prescribing trends. Learn about some of the ways data is being used to address this epidemic as well as how providers can use health information to support patient care when addiction is involved.
Read More
| Categories: AIHC Professional Articles, Compliance and the Opioid Epidemic | Tags: HHS, CDC, SAMHSA, ONC, Providers, HRSA, HIPAA, Security, Privacy, HIPAA Covered Entities, Compliance, Pain Management, Addiction, Opioid Crisis, Healthcare Employees, Training, Health IT, 42 CFR Part 2, Agency for Healthcare Research and Quality | View Count: (392)
09

How to Avoid the Dangers of Identity Theft

posted on
By Larry Reed Technical Writer, Design Rush Identity theft occurs when a malicious third party deliberately assumes your identity for the purpose of obtaining some sort of an advantage over you, or otherwise cause you harm. Identity thieves may use your information to make purchases, apply for loans, file tax returns, take control of your […]
Read More
| Categories: Compliance | Tags: Cybersecurity, data encryption, data security, identity theft, phishing, two-factor authentication | View Count: (147)
Do You Know the Difference Between HIPAA Versus the Common Rule?
The HIPAA Privacy Rule establishes the conditions under which protected health information may be used or disclosed by covered entities for research purposes. The Common Rule is a federal policy regarding Human Subjects. Implementation of the Final Rule related to the Common Rule is January 21, 2019. Do you know what the differences are between these two regulations?
Read More
| Categories: AIHC Free CEU Articles, AIHC Professional Articles | Tags: HHS, OCR, Providers, HIPAA, Security, Privacy, HIPAA Covered Entities, Compliance, Common Rule, Training, Continuing Education, Department of Defense, FDA | View Count: (1167)
Page 1 of 4 FirstPrevious [1]234 Last
Search
Blog Subscription
Name

Categories
Articles by Month
AIHC Facebook Feed
HHS
CMS - Centers for Medicare & Medicaid Services
Disclaimer

Articles written by the American Institute of Healthcare Compliance are under Copyright Notice: © 2016-2019 American Institute of Healthcare Compliance, Inc. All Rights Reserved. Views expressed through RSS feeds or remarks made on this blog or website are solely those of the original authors and other contributors and do not necessarily represent those of the American Institute of Healthcare Compliance and/or staff.