Blog
-
What is a HIPAA Security Risk Analysis?
A security risk analysis is a vital part of the risk management process. According to the HIPAA Security Rule, all HIPAA-covered organizations must conduct them.…
-
Update on Texting Patient Orders
The Joint Commission (TJC) has concluded that it is not acceptable to use secure text messaging for patient care orders. Industry experts weighed in on…
-
What Are TPO Disclosures?
There are serious consequences to impermissibly disclosing patients’ protected health information (PHI). This is a paralyzing prospect to many healthcare employees. Consequently, some staff members…
-
Risky Business: Should You Keep Documents in Storage Units?
Document management and storage is a universal business concern. This issue is even greater for healthcare organizations. As a HIPAA-covered organization, you must keep both…
-
Social Engineering: A Hacking Story
We’re all familiar with what a technical hacker is. They sit behind a computer somewhere planning their strike on an unsuspecting healthcare company. Healthcare is…
-
5 Easy Steps to Enhance Cybersecurity
Hacking incidents – and the number of records exposed by hackers – are on the rise. The healthcare industry is a prime target for cybercriminals.…
-
Do Janitorial Services Require a Business Associate Agreement?
As a HIPAA-covered organization, you know you need business associate agreements (BAAs) for many of your vendors. But what about your janitor? Are janitorial services…
-
10 Common Questions About the HIPAA Privacy Rule
Though the HIPAA Privacy Rule has been in effect since 2000, many people still don’t know what it does. This post will answer ten common…