Who needs a Business Associate Agreement?
If you are in any way involved with HIPAA, then you have likely heard of a Business Associate Agreement. Covered Entities know they need them but maybe not when they… Read more »
If you are in any way involved with HIPAA, then you have likely heard of a Business Associate Agreement. Covered Entities know they need them but maybe not when they… Read more »
For most small practices, the HIPAA compliance requirements can seem very confusing. Sometimes they may not even make sense. One of these is the requirement that all software used by… Read more »
The HIPAA Security Rule (45 C.F.R. § 164.308 (a)(5)(ii)(B) requires that all software used by Covered Entities and Business Associates be kept current and up to date with updates from… Read more »
Medical practices need plans for protecting the PHI that they have. A keep sign won’t be enough… [DISPLAY_ULTIMATE_SOCIAL_ICONS]
One of the most important parts of cybersecurity is actually having a backup and disaster recovery plan in place. This is often the area that many practices overlook because it… Read more »
A phishing email caused a breach at a Colorado-based practice that resulted in the unauthorized release of the protected health information (PHI) of 23,000 patients. Using a phishing email to… Read more »
Many sites have been fined for throwing away records in an improper way. [DISPLAY_ULTIMATE_SOCIAL_ICONS]
In the past, most people only needed to remember a couple of passwords and PIN numbers in their daily lives. However, as we use more and more online services such… Read more »
Sometimes it easy to forget just how expansive HIPAA regulations really are. Often we think it’s limited to paper records or electronic medical records (EMR). However, HIPAA covers all places… Read more »
How strong and secure is your password? If it’s on the top 100 list of most common passwords, then yours isn’t strong enough to protect you. [DISPLAY_ULTIMATE_SOCIAL_ICONS]