There are four HIPAA rules any one working with ePHI should know about. They are: 1. HIPAA Privacy Rule 2. HIPAA Security Rule 3. HIPAA Enforcement Rule 4. HIPAA Breach Notification Rule The HIPAA Privacy Rule The HIPAA Privacy Rule establishes national standards to protect individuals’ medical records and other personal health information and applies […]
This author has yet to write their bio.Meanwhile lets just say that we are proud LLeija contributed a whooping 5 entries.
Entries by LLeija
HIPAA established the Security Rule to ensure that all covered entities have implemented safeguards to protect the confidentiality, integrity, and access of PHI. There are two types of implementation specifications: “required” and “addressable.” Wherever the Security Rule reads “required,” that specification must be implemented; whereas, if it says “addressable,” there is some wiggle room in […]
An overview Before we delve into this topic, a note: this article is not an exhaustive list of all that is required for HIPAA compliance. You may decide to contact an attorney or Privacy Officer to help you examine each rule thoroughly and put an action plan in place. Our intention is to get you […]
Yesterday, the Syrian Electronic Army (SEA) hacked into Skype and Microsoft’s twitter account. The twitter feed read, “Don’t use Microsoft emails (hotmail,outlook), They are monitoring your accounts and selling the data to governments.” The same post also appeared on Microsoft’s twitter feed. Both were swiftly removed. In a statement today, Skype representatives said, “No user […]
Did you know that SecureVideo.com is not just for people in the medical field that need to abide by HIPAA laws? The truth is, anyone looking for an easy, secure, low-cost video conferencing connection could use SecureVideo. Our meetings are peer-to-peer. That means your video session isn’t routed through any servers and it can’t be […]