Charity Week – Pack for a Purpose
This week, we are taking a break from our usual HIPAA Blogs and ask you to remember one of our favorite charities, Pack for a Purpose (PfaP), when you consider your #GivingTuesday donations. The International Day of Giving (#GivingTuesday), November 29th, is one time...
NueMD HIPAA Survey Results
In 2014, NueMD, an Electronic Health Record (EHR) and billing software company, distributed a questionnaire to medical practices and billing companies to gain insights on their knowledge of HIPAA regulations, compliance measures, and communication methods.¹ There were...
Are You Prepared for Ransomware?
Both large and small businesses are warned about hackers getting into their files and demanding a ransom in order to release the blocked access. Businesses are not preparing for the inevitable. It is easy pickings for hackers. The question is not will you face this...
HIPAA and Cloud Computing Part II
Health and Human Services (HHS), Office of Civil Rights’ (OCR) Phase 2 of the HIPAA Audit Program is scheduled to begin for business associates with desk audits in November 2016. OCR is randomly selecting business associates for these desk audits from a pool of...
Encrypting Devices
Most electronic devices come with the ability to encrypt the internal drive. Encrypting your data adds an extra protection to your files by minimizing the risk of a breach in the event your device is lost or stolen. This is because an encrypted and password protected...
OCR’s Phase 2 of HIPAA Audit Program Focuses on Business Associates
The Department of Health and Human Services’ (HHS) announcement that they will begin auditing Business Associates in October motivated a Covered Entity’s compliance officer to call Total HIPAA last week. He had done a Google search on what a Covered Entity should do...
Multi-Line Agencies and Privacy Requirements
It’s important to train all staff in a multi-line agency on HIPAA Compliance There is a great deal of crossover within a multi-line agencies. Cross-selling group or individual health insurance and other benefits, between personal lines and key commercial lines...
Strong Passwords – Your Employees Most Important Contribution to Network Security
Are your passwords so easy that a seven year old can figure them out? In 2012, Dropbox verified that the user information of 68 million Dropbox users was stolen. This information included both usernames and passwords. Though Dropbox was aware of this breach, there was...
