Related Stories

Why You Need Business Associate Agreements - 05/07/2025

A medical practice in Illinois in April paid a $31,000 fine because it didn’t have a business associate agreement (BAA) with one of its long-time vendors. Any chance your practice has overlooked signing a BAA with any of its business associates?


Risk Management - 03/20/2025

Practice e-Tips on Risk Management


What Are HIPAA Transaction and Code Sets Standards? - 03/20/2025

Learn about the HIPAA Transactions and Code Sets Rule that standardizes electronic data interchange (EDI) transactions for submitting, processing, and paying claims. Has your practice met the required standards?


20 Everyday HIPAA Tips - 03/17/2025

 The goal of HIPAA is to make sure the protected health information you are responsible for or come into contact with remains confidential, secure, and available when you need it. Here are basic steps every practice can take to help make this happen.  


FTC Mandates Vendors Notify Patients of Breaches in Health Information - 11/07/2024

The Federal Trade Commission has amended its Health Breach Notification Rule to require vendors of personal health records and related entities not covered by HIPAA to notify individuals, the FTC, and, at times, the media, when a breach in protected health information occurs. The change will take effect July 29.


Physicians Can Delegate Breach Notifications to Change Healthcare Following Cyberattack - 06/26/2024

The U.S. Department of Health and Human Services’ Office of Civil Rights announced  May 31 that covered entities – such as health plans, health care clearinghouses, and physicians – affected by privacy breaches stemming from the February cyberattack on Change Healthcare and its parent corporation UnitedHealth Group may delegate breach notifications to both companies.


HIPAA and Medical Power of Attorney - 03/20/2024

Does the HIPAA Privacy Rule change the way in which a person can grant another person medical power of attorney?


Stop Paying to Get Paid - 02/28/2024

Did you know you don’t have to accept health plan payment via virtual credit card? You have a right to request direct deposit.


Feds Update HIPAA Security Risk Assessment Tool - 11/01/2023

To aid small- and medium-sized practices in complying with the HIPAA Security Rule, federal officials have updated their risk assessment tool designed to help practices identify areas where electronic  protected health information (ePHI) is at risk.


Who Will Run Your Practice If You Can’t? - 08/23/2023

You might have given thought to what would happen to your solo practice and your family in the event of your death, but what if you have a serious accident or illness and are unable to work for, say, several months?


New Texas Law Shortens Data Breach Notification Period - 08/21/2023

Texas physician practices and other health care facilities soon will be required to give more timely and public notice of any breaches of computerized data, including electronic health records and billing information.


HIPAA Security Rule: Move It to Top of Mind - 08/07/2023

Problems with HIPAA Security Rule safeguards, both administrative and technical, continue to fall among the top five HIPAA security issues the U.S. Department of Health and Human Services identifies each year.


Security Risk Analysis for HIPAA — and Medicare/Medicaid? - 08/07/2023

Do you need to conduct a security risk analysis or review of your practice in the next 72 days?


Your Photocopier May Be a Security Risk - 08/07/2023

Don’t let this happen to you! A health plan paid a huge fine after it returned leased copiers that held protected health information.


Top Three Reasons Embezzlement Occurs - 10/11/2022

Medical practices suffer from one of the highest embezzlement rates of all service industries.Several factors can contribute to embezzlement. The top three are opportunity, pressure, and rationalization.


Did That Employee Quit, or Did You Fire Her? - 10/11/2022

The question of whether an employee quit or was fired is very important if the ex-employee files for unemployment benefits. It determines who has the burden of proof in the case. These tips from the Texas Workforce Commission can help you keep the onus of proof off you.


How to Delete Data — for Real - 10/07/2022

Whenever your practice scraps, trades in, donates, or sells electronic equipment, make sure the storage media is wiped clean of all data. Often your safest bet to remove the storage capabilities and destroy the hard drives or memory cards.


Paying Employees for Lunch Break - 09/08/2021

Does your practice have clear policies regarding rest and meal breaks for hourly (nonexempt) employees?


Patient Privacy’s New Frontier: AMA Aims to Keep Apps Honest With Personal Health Data - 12/01/2020

In the evolving world of health information technology, some vendors that store and transmit health information – such as the tech minds behind certain mobile apps – are getting their hands on patient data without any HIPAA leash to rein in their use of it. Now, organized medicine is doing its part to preserve patients’ privacy when their health information finds its way outside of HIPAA-covered organizations.


Upgraded Free Tool Helps With HIPAA Compliance - 10/12/2020

If you participate in the Medicare Merit-Based Incentive Payment System (MIPS), you must complete your security risk assessment by Dec. 31. An upgraded tool from the U.S. Department of Health and Human Services might make the assessment easier.


Is Your Patients’ HIPAA-Protected Information Secure? - 05/13/2020

A guide from TMA-endorsed DocbookMD helps smaller practices understand the risks of using mobile devices and how to stay HIPAA-secure.


Understanding HIPAA: Working From Home - 05/30/2019

Can an employee work from home under HIPAA? The answer is yes, as long as you implement the appropriate security to protect data accessed from the employee’s home.


Protect Your Practice’s Social Media Accounts - 05/30/2019

Social media is a terrific way to reach out and stay in contact with your patients. However, the risks created by social media cannot be ignored. Controlling access to your social media accounts is just the first step in ensuring their security.


Security Alert: Are Your Browsers Vulnerable to POODLE? - 05/30/2019

Many of us take for granted that if we’re diligent about keeping our systems current with the latest security updates, we’re protected from threats. Unfortunately, this isn’t the case.


Phishing: Popular Sport of Cyber Attackers - 05/30/2019

…And they are out to catch you. Here’s how to identify malicious emails you need to guard against.