Tag: HIPAA compliance

Evidence that the world is going mobile is everywhere. The market for connected health technology is projected to hit $117 billion by 2020, and 86 percent of clinicians believe mobile apps will be central to patient health in that time frame. At least 50 percent of smartphone users have downloaded a mobile health app. We also see mobile’s growth with the appearance of tablets, more powerful smartphones and Fitbits. As healthcare patients turn into healthcare consumers, patient portals and apps …

Encryption has been widely talked about as one of the best tools to protect you against potential attacks on your data. For many companies processing credit card payments, encrypting data is required for compliance with standards such as PCI DSS and individual state laws. But if you’re in the healthcare industry, it’s even more important because it’s not required for hipaa compliance. What is encryption? It takes your data and codes it using a series of mathematical formulas to render …

To address the question of whether or not to use data encryption when it comes to meeting HIPAA compliance and keeping patient health information (PHI) protected, let’s revisit the Health Insurance Portability and Accountability Act of 1996 (HIPAA): A covered entity must, in accordance with §164.306… Implement a mechanism to encrypt and decrypt electronic protected health information.” (45 CFR § 164.312(a)(2)(iv)) If you choose not to encrypt data, the HIPAA Security Rule states you must implement an equivalent solution to meet …

Safeguarding Patient Data in EHRs

Posted on November 26, 2015 by

A recent blog by the HIPAA, HITECH & HIT legal blog of Fox Rothschild revealed a survey administered by the Office of Inspector General (OIG) of the U.S. Dept. of Health & Human Services (HHS). The EHR (electronic health record) technology questionnaire is part of a study on fraud and abuse safeguards in EHRs. The questionnaire may serve as insight for hospitals attempting to establish safeguards with their digital systems to protect electronic protected health information (ePHI) and prevent a …

Michigan HIMSS 2014 Fall Conference

Posted on September 12, 2014 by

Online Tech rarely misses an opportunity to attend a HIMSS event, which are always packed with healthcare information management hot button topics and innovative ideas. So we’re particularly eager for next week’s Michigan HIMSS Chapter 2014 Fall Conference in Plymouth Township, just minutes from our Ann Arbor headquarters and three of our four Michigan data centers. The theme for the Sept. 16-17 event is “Health Information Technology: The Vision and the Value” and it will be held at The Inn …

There’s a new leader on the U.S. Department of Health & Human Services’ Wall of Shame. A hacking group known as “APT 18” is suspected of stealing names, Social Security numbers, addresses, birthdays and telephone numbers from 4.5 million patients of Community Health Systems, a network of 206 hospitals across 29 states (see map at right). Credit card numbers and medical records were not accessed. It’s the largest attack involving patient information since the HHS started tracking HIPAA breaches in …

After the recent rash of high-profile data breaches, the Internet is ripe with tips for handling a breach at your organization. The standard experts’ message: Notify consumers immediately and don’t downplay the impact. The Dallas Morning News has a keen interest in data breaches because some of the largest recent reports come from retailers headquartered in its home state of Texas: Nieman-Marcus (Dallas), Sally Beauty Holdings (Denton) and Michaels Stores (Irving). In a Sunday story, reporter Pamela Yip discussed proper …

Mom always said to choose your friends wisely. Maybe she was trying to protect you from a data breach. AT&T learned that lesson the hard way. From a statement released by the company : “We recently learned that three employees of one of our vendors accessed some AT&T customer accounts without proper authorization. This is completely counter to the way we require our vendors to conduct business. We know our customers count on us and those who support our business …

After the recent eBay data breach in which more than 145 million user records were reportedly compromised by hackers, the internet is once again full of stories about consumers demanding better protection, analysts blaming organizations for not following basic cybersecurity protocol, and tales of hackers that are simply out-sophisticating sophisticated security (eBay used two-factor authentication and encryption, which did protect users’ financial information). There are the standard tips for consumers: change your passwords, don’t use the same password on multiple …

If you’ve ever been to a HIMSS show, you know it’s one of the most important healthcare organizations ever made. It’s brimming with healthcare information management hot button topics and innovative ideas. It’s working collectively to optimize patient outcomes and care through technology and policy changes that will keep people safe and healthy. It’s comprised of the field’s leading experts and advocates, and is continually making positive change in the healthcare industry. Which is why we’re so excited to go …

Get started now. Exceptional service awaits.

Live Chat