Tag Archives: Health IT Information Security
← Older posts Newer posts →Environmental Intelligence Releases January 2014 EI Connections Newsletter
January 31, 2014Environmental Intelligence LLC is pleased to release its January 2014 EI Connections Newsletter. Please send your feedback or suggestions to [email protected]. Click Here to view: January 2014 EI Connections Newsletter Want to automatically receive our monthly newsletter? Click on this link to … Continue reading
Posted in Environmental Intelligence | Tagged CMS, CMS EHR Incentives, CMS Policy, EHR, EHR Adoption, EHR Cloud Hosting, EHR Consulting, EHR Hosting, EHR Implementation, EHR Incentives, EI Connections Newsletter, Electronic Health Records, Electronic Medical Records, EMR, Health Information Exchange, Health IT, Health IT Information Security, Health IT Policy, Health IT Services, Health IT Standards, HHS, HIE, HIE Standards, HIPAA Compliance, HIPAA Privacy and Security Rules, ICD-10, Meaningful Use, medical practice best practices, ONC, Patient Experience, PHI Data Security, Stage 2 Meaningful Use Rule, Stage 3 Meaningful Use | Leave a commentEnvironmental Intelligence Releases December 2013 EI Connections Newsletter
December 31, 2013Happy New Year! Environmental Intelligence LLC is pleased to release its December 2013 EI Connections Newsletter. Please send your feedback or suggestions to [email protected]. Click Here to view: December 2013 EI Connections Newsletter Want to automatically receive our monthly newsletter? Click on … Continue reading
Posted in Environmental Intelligence | Tagged CMS, CMS EHR Incentives, CMS Policy, EHR, EHR Adoption, EHR Best Practices, EHR Consulting, EHR Hosting, EHR Implementation, EHR Incentives, EI Connections Newsletter, Electronic Health Records, Electronic Medical Records, EMR, Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, HHS, HIPAA Compliance, HIPAA Privacy and Security Rules, Meaningful Use, ONC, Patient Experience, PHI, PHI Data Breaches, PHI Data Security, PHI Security, Stage 2 Meaningful Use Rule, Stage 3 Meaningful Use | Leave a commentPHI Data Breaches Makes Top Five Security Concerns For 2014
December 16, 2013Every year, Coalfire, an IT governance, risk and compliance firm, names its top 5 information security and compliance predictions for the new year. And this time around, healthcare data breaches made the cut. The prediction? Expect a huge increase of … Continue reading
Posted in Health IT Data Security | Tagged BYOD, Cloud Computing, Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, HIPAA Compliance, HIPAA Privacy and Security Rules, medical practice best practices, PHI Data Breaches, PHI Data Security, PHI Security | Leave a commentReported PHI Data Breaches Increased In 2013
December 11, 2013More than twice as many individuals have been affected by healthcare data breaches in 2013 than in 2012. And the main reason is a handful of mega-breaches this year, the current federal tally shows. But three recent large breaches that … Continue reading
Posted in PHI Data Security | Tagged Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, HHS, HIPAA Compliance, HIPAA Privacy and Security Rules, OCR, PHI, PHI Data Breaches, PHI Data Security, PHI Security | Leave a commentOIG Report Finds OCR Security Failures
December 9, 2013It’s an ironic story. The Office for Civil Rights, the division of HHS responsible for investigating HIPAA privacy and security violations, is now facing scrutiny after its own security practices failed to meet federal requirements. Not only did OCR fail … Continue reading
Posted in HIPAA Complicance | Tagged EHR, EHR Adoption, EHR Best Practices, EHR Consulting, EHR Implementation, Electronic Health Records, Electronic Medical Records, EMR, Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, HIPAA Compliance, HIPAA Privacy and Security Rules, OCR, OCR Audits, PHI, PHI Data Breaches, PHI Data Security, PHI Security | Leave a commentEnvironmental Intelligence Releases November 2013 EI Connections Newsletter
December 4, 2013Environmental Intelligence LLC is pleased to release its November 2013 EI Connections Newsletter. Please send your feedback or suggestions to [email protected]. Click Here to view: November 2013 EI Connections Newsletter Want to automatically receive our monthly newsletter? Click on this link to … Continue reading
Posted in Environmental Intelligence | Tagged CMS, CMS EHR Incentives, CMS Policy, EHR Adoption, EHR Consulting, EHR Implementation, EHR Incentives, EI Connections Newsletter, Electronic Health Records, Electronic Medical Records, Environmental Intelligence, Health Information Exchange, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, Health IT Standards, HHS, HIE, HIE Standards, HIPAA Compliance, HIPAA Privacy and Security Rules, Meaningful Use, ONC, Patient Experience, PHI, PHI Data Breaches, Stage 2 Meaningful Use Rule | Leave a commentAudit Trail Policy – An Effective Tool To Prevent Unauthorized PHI Access
November 27, 2013When in the realm of healthcare privacy and security, electronic health records may facilitate easier data exchange and data viewing, but the systems’ audit trails make catching unauthorized viewers all the more simple, too. And, in the digital age, these … Continue reading
Posted in PHI Data Security | Tagged EHR, EHR Adoption, EHR Consulting, EHR Implementation, Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, Health IT Tips, HIPAA Compliance, HIPAA Privacy and Security Rules, medical practice best practices, Patient Experience, PHI, PHI Data Breaches, PHI Data Security | Leave a commentThe BYOD Movement In Healthcare
November 19, 2013“I recently had a security manager tell me the days he dreads the most are days after major holidays,” said Kenneth Kleinberg, managing director of The Advisory Board Company. IT managers are very familiar with the sentiment. The days when … Continue reading
Posted in Health IT | Tagged Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Services, Health IT Standards, HIPAA Compliance, HIPAA Privacy and Security Rules, PHI, PHI Data Security, PHI Security, telemedicine | Leave a commentEnvironmental Intelligence Releases October 2013 EI Connections Newsletter
November 7, 2013Environmental Intelligence LLC is pleased to release its October 2013 EI Connections Newsletter. Please send your feedback or suggestions to [email protected]. Click Here to view: October 2013 EI Connections Newsletter Want to automatically receive our monthly newsletter? Click on this link to … Continue reading
Posted in Environmental Intelligence | Tagged CMS EHR Incentives, CMS Policy, EHR, EHR Adoption, EHR Consulting, EHR Implementation, EI Connections Newsletter, Electronic Health Records, Electronic Medical Records, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, HIPAA Compliance, HIPAA Privacy and Security Rules, Meaningful Use, medical practice best practices, ONC, Patient Experience, PHI Data Security, Stage 2 Meaningful Use Rule | Leave a commentPatient Portal Security Considerations
November 4, 2013As healthcare facilities launch their own patient portals, technology is only the first step. Administrators are learning that decisions need to be made on everything from patient login protocols to support for patient record revisions. HIPAA regulations, always a primary … Continue reading
Posted in Health IT Data Security | Tagged EHR, EHR Adoption, EHR Consulting, EHR Implementation, Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, HIPAA Compliance, HIPAA Privacy and Security Rules, PHI, PHI Data Security, PHI Security, Stage 2 Meaningful Use Rule | Leave a comment ← Older posts Newer posts →