Related Stories

Don’t Try This at Work: Security Risk Analysis Is Not a Do-It-Yourself Project - 07/01/2019

Medicare’s Merit-Based Incentive Payment System (MIPS) requires practices to conduct a security risk analysis at least once a year. HIPAA requires at least one analysis, and annual check-ups are considered a best practice. Many physicians find out through these reports that their practices have a lot of work to do to keep patient records safe.


The Meaning of Monthly: Court Ruling Offers Hope on Pain Clinic Registrations - 07/01/2019

Physicians can encounter a web of confusion and unfairness when it comes to navigating the Texas Medical Board (TMB). A Travis County district court has given Texas physicians clarity and hope when it comes to certain medical board investigations. The court’s decision, if it holds up, establishes an important precedent for when physicians are required to register their facility as a pain management clinic.


Final Verdict? Case Tests Court's Ability to Overturn a Jury Verdict - 06/12/2019

It was an overwhelming, 12-0 verdict – a jury’s unanimous rejection of a negligence case against a Laredo physician. Then, a judge took that decision away and ordered a new trial – not because of jury misconduct, or any procedural stumble that usually negates a court decision. It was taken away, essentially, because the judge said so.


Your Photocopier May Be a Security Risk - 05/30/2019

Don’t let this happen to you! A health plan recently paid a huge fine after it returned leased copiers that held protected health information.


Windows XP Support Ending Soon - 05/30/2019

Are you a Microsoft Windows XP user? If so, it’s probably time to upgrade. Your PC won’t be secure after April 8, 2014


What Are HIPAA Transaction and Code Sets Standards? - 05/30/2019

Learn about the HIPAA Transactions and Code Sets Rule that standardizes electronic data interchange (EDI) transactions for submitting, processing, and paying claims. Has your practice met the required standards?


Why Strong Passwords Are Important - 05/30/2019

Passwords are an early line of defense in protecting your patient data and an easy fix to strengthening your protections.


Understanding HIPAA: Working From Home - 05/30/2019

Can an employee work from home under HIPAA? The answer is yes, as long as you implement the appropriate security to protect data accessed from the employee’s home.


Protect Your Practice’s Social Media Accounts - 05/30/2019

Social media is a terrific way to reach out and stay in contact with your patients. However, the risks created by social media cannot be ignored. Controlling access to your social media accounts is just the first step in ensuring their security.


Security Alert: Are Your Browsers Vulnerable to POODLE? - 05/30/2019

Many of us take for granted that if we’re diligent about keeping our systems current with the latest security updates, we’re protected from threats. Unfortunately, this isn’t the case.


Phishing: Popular Sport of Cyber Attackers - 05/30/2019

…And they are out to catch you. Here’s how to identify malicious emails you need to guard against.


HIPAA: Are You Prepared for a Patient Complaint? - 05/30/2019

The most common type of patient HIPAA complaint stems from interpersonal relationships and conflicts. Do you know what do if you receive a patient HIPAA complaint?


Most Physicians No Longer Creditors Under Red Flags Rule - 05/30/2019

A new law limits the definition of “creditor” under the Red Flags Rule — and now most physicians no longer fall under its requirements.


HIPAA: Are You Prepared for a Computer Virus Incident? - 05/30/2019

Computer viruses, or malware, are so widespread they seem impossible to prevent. The most common type contains programs designed to steal the data on your computer and network. You can’t ignore them.


HIPAA: Are You Prepared for a Lost Laptop or Smartphone? - 05/30/2019

Even if the only work-related activity is accessing your email, you may have PHI on your phone right now. Lost and stolen devices are the No. 1 reason for patient data breaches of more than 500 records.


HIPAA: Are You Prepared for a Business Associate Breach? - 05/30/2019

Business associate breaches can be the most costly type of breach and present some of the highest risk because you don't have insight or control over the business associate's security or policies.


HIPAA Security: What Risks Are Realistic for Your Practice? - 05/30/2019

Here are some of the factors practices should consider when assessing the security of their patients’ electronic protected health information.


HIPAA Privacy and Security Audits Coming Soon - 05/30/2019

A whole new round of audits — for compliance with HIPAA privacy requirements — are set to begin in early 2013.


HIPAA Security Rule: Move It to Top of Mind - 05/30/2019

Pilot audit reports suggest a good place to start your HIPAA security compliance is with a careful reading of the HIPAA Security Rule, and training.


HIPAA Compliance Requires Continuous Monitoring - 05/30/2019

HIPAA security compliance means not only preventing compromised protected health information but also recognizing when it happens and being able to discover what went wrong.


Federal HIPAA Guide Gives Practical Advice - 05/30/2019

A revised HIPAA guide from the Office of the National Coordinator for Health Information Technology delivers practical, actionable information for small and medium-size practices. This tip looks at security documentation advice from the guide.


HIPAA Best Practices for Photocopiers, Printers, and Fax Machines - 05/30/2019

Here are three best practices to consider when creating your HIPAA policy and procedures for photocopiers, printers, and fax machines.


Feds Launch Phase 2 of HIPAA Compliance Audits - 05/30/2019

The U.S. Department of Health and Human Services Office for Civil Rights (OCR) has launched Phase 2 of its HIPAA audit program. FCi Federal will conduct the audits for OCR. The new round of audits will assess physicians' compliance with HIPAA's patient privacy provisions.


Breach Notification Rules Get a Makeover - 05/30/2019

Rules about notifying patients when their electronic protected health information (PHI) has been breached — that is, used or disclosed impermissibly — got stronger under HIPAA, while a new state law brought some relief.


Eight Steps to a HIPAA Security Risk Analysis - 05/30/2019

Many practices have not yet conducted and documented this required HIPAA task. Follow these eight steps to complete your risk analysis.