Touchstone Compliance

covered entities

Cracking the Code of HHS Guidelines for Encryption of PHI

To encrypt or not to encrypt, that is the question. Or to put it another way: To convert readable data into gibberish that must be decoded to become readable again — or not to convert readable data into gibberish that must be decoded to become readable again, that is the question. The Health Insurance Portability […]

Cracking the Code of HHS Guidelines for Encryption of PHI Read More »

The Basics of Mobile Device Security for Protected Health Information

The single most common way Protected Health Information (PHI) is compromised is through the loss of devices themselves, whether this happens by accident or by theft. Technology — thumb drives, CDs, smart phones, tablets — has made it possible for large amounts of information to be tucked into our pockets or purses and carried to

The Basics of Mobile Device Security for Protected Health Information Read More »

Urban Legends & the HIPAA Risk Analysis

Strange as it might seem, HIPAA compliance and the New York City sewer system share a connection. Both have given rise to “stories with little or no supporting evidence that spread spontaneously in varying forms and often have elements of humor, moralizing, or horror” — in other words, both contain  the stuff of “urban legends.”

Urban Legends & the HIPAA Risk Analysis Read More »

Can You Keep a Secret? 9 Tips for Creating Strong Passwords.

The computers in your office are veritable treasure chests of information cyber pirates would love to get their hands on. Only authorized personnel in a practice should have the keys to unlock what’s inside.  Passwords as those keys. They play an important role in protecting Electronic Health Records (EHR) and the vital information those records

Can You Keep a Secret? 9 Tips for Creating Strong Passwords. Read More »