shield-bullet pt-shield youtube search phone linkedin facebook twitter envelope home menu chevron-down chevron-left chevron-right chevron-up close
Contact Us

Talk with our experts

Get Started Today!
Close

Blog

The Human Factor in Disclosing a HIPAA Breach

When someone thinks he or she may have made a mistake, their first instinct might be to keep quiet about it and hope that it’s not really a problem.  That’s the wrong instinct when dealing with protected health information of others (PHI) that is subject to HIPAA’s Breach Notification Rule. The US Department of Health […]

Read More

Protect Patient Health Information (ePHI) By Knowing Exactly Where it is

Where is your patient’s personal health information? Sometimes, the hardest part about HIPAA compliance is understanding where the electronic patient health information (ePHI) actually is. The database where you house ePHI is encrypted and sits behind a state of the art firewall. It looks very solid and comforting, but where else is the ePHI? That […]

Read More

What to Do If You Find Someone Else’s Health Information (PHI)

My first data breach went like this: In the early 2000s, a young accountant was flying back to the home office after working several days onsite at a year-end audit. She had brought along two compact discs, one loaded with detailed employee information and the other loaded with her favorite songs. Thinking it was her […]

Read More

Settlement Highlights Why IT Change Management is So Important for Compliance

I hate change. I especially hate change when it comes to my technology. I reach a stable state with my computer network, which permits me to achieve great efficiency, but when I change one thing, something else changes that I didn’t intend. Soon, I am spending hundreds of dollars to get back to a stable […]

Read More

Is Pokémon Go A HIPAA Nightmare?

Pokémon is the second best-selling franchise worldwide, having sold 279 million video game software units as of 2015. When it was announced that the beloved game would be brought to mobile devices for free in the form of an augmented reality game, millennials everywhere had their childhood dream of traveling the world to catch Pokémon […]

Read More

Mobile Health Apps and HIPAA

When technology is so rapidly developing, it’s no surprise that HIPAA has had a hard time with keeping up with the times. The Health Insurance Portability and Accountability Act, the landmark 1996 patient-privacy law, only covers patient information kept by health providers, insurers, and data clearinghouses, as well as their business partners. The popularity of wearable technologies, […]

Read More

Catholic Health Care Services Paying $650,000 in Fines

Catholic Health Care Services of the Archdiocese of Philadelphia is going to pay $650,000 in fines as part of a settlement after HIPAA violations involving a stolen iPhone. According to the Office for Civil Rights, the health of information of 412 nursing home patients became compromised after the incident. OCR determined that there were no policies […]

Read More

Preparing for the Phase 2 HIPAA Audits

With the second phase of HIPAA audits underway every covered entity and business associate is eligible for an audit. However, the OCR will not be auditing those entities that currently have an open complaint investigation or are undergoing compliance review. These audits will evaluate organization’s compliance with HIPAA security, privacy, and breach notification rules. Any […]

Read More

Mental Health Reform Bill to Clarify HIPAA Privacy Issues

The House voted to pass H.R. 2646 with a landslide 422-2 vote. The bill previously contained changes to HIPAA allowing healthcare providers to share information about mentally ill patients with their caregivers, these changes were removed due to opposition by both Democrats and Republicans. It does contain content to encourage the early identification of mental […]

Read More

Ransomware and HIPAA

With the relatively recent development of ransomware, the Department of Health and Human Services’ Office has started developing guidance for how to handle ransomware attacks in circumstance in which information that may be protected under HIPAA security rules could be compromised. Currently the recommended course of action is to determine whether or not the information has […]

Read More