


You Have a HIPAA Breach!
These few words make everyone’s heart sink. You’ve trained your employees, instituted Privacy and Security Policies and Procedures, set up all your security measures, and yet you still had a breach. What can you do? (If you haven’t taken these steps, we need to have a...
Using HIPAA Guidelines to Protect Your Personal Information
Community Health Systems Inc. (CYH.N), one of the biggest U.S. hospital groups, said on Monday it was the victim of a cyber attack from China, resulting in the theft of Social Security numbers and other personal data belonging to 4.5 million patients.1 A Russian crime...
Guest Blog: Maintaining HIPAA Compliance with Dropbox
I am still traveling this week, and we are running another guest blog. This is from our friends at Sookasa. They have a great, HIPAA compliant file sharing service. On to the blog: A doctor looks up at the departure board in the airport and sees that his flight has...
Analysis of the Annual Report to Congress on Breaches of Unsecured PHI
For Calendar Years 2011 and 2012 Just released, the original report is pretty long, and well, let’s face it, a little (actually, very) boring. (Here it is if you want to brave it-HHS Report) I’m going to extract a few highlights for you over the next couple of weeks...