In a previous blog I talked about the importance of email security in today’s healthcare practices. I focused mainly on the advantages of using secure HIPAA compliant email in communications with patients, and how that kind of communication can earn a doctor or dentist a high rating on social media and, quite possibly, a better […]
The single most common way Protected Health Information (PHI) is compromised is through the loss of devices themselves, whether this happens by accident or by theft. Technology — thumb drives, CDs, smart phones, tablets — has made it possible for large amounts of information to be tucked into our pockets or purses and carried to
As part of HIPAA compliance, every healthcare office must have a Privacy Officer and a Security Officer. This article describes the responsibilities of each.
In the event of a disaster, here’s what every healthcare provider needs to know about data backup of Personal Health Information (PHI and ePHI).
Policies and procedures play a key role in HIPAA compliance. Here’s a partial list of the policies and procedures every healthcare practice needs to have in place.