Tag Archives: PHI Data Breaches
← Older posts Newer posts →No Encryption Results In Largest Reported PHI Data Breach
September 3, 2013One warm night in mid-July, more than 4 million patient records breezed out the door of the Advocate Medical Group administrative office in Park Ridge, Ill., in the arms of an unidentified thief who stole four computers from the largest … Continue reading
Posted in PHI Data Security | Tagged EHR, EHR Best Practices, EHR Consulting, EHR Implementation, Electronic Health Records, Electronic Medical Records, EMR, Encryption Solutions, Encryption Technology, Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, HIPAA Compliance, HIPAA Privacy and Security Rules, medical practice best practices, Patient Experience, PHI, PHI Data Breaches, PHI Data Security, PHI Security | Leave a commentNo Encyption Leads To Second Largest Healthcare Data Breach
August 27, 2013The recent theft of four unencrypted desktop computers from a Chicago area physician group practice may result in the second biggest healthcare breach ever reported to federal regulators. But the bigger issue is: Why do breaches involving unencrypted computer devices … Continue reading
Posted in PHI Data Security | Tagged Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, HIPAA Compliance, HIPAA Privacy and Security Rules, medical practice best practices, PHI, PHI Data Breaches, PHI Data Security | Leave a commentPerspectives On Cloud Computing And HIPAA Compliance In Healthcare
August 22, 2013There is a fair amount of uncertainty about adopting cloud services in healthcare, especially around sensitive health data. While the federal government’s rules are complicated, we know for a fact there’s nothing inherently dangerous about the technology. The term “cloud … Continue reading
Posted in Cloud Computing | Tagged Cloud Computing, cloud hosting, cloud services, Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, HIPAA Compliance, HIPAA Privacy and Security Rules, PHI, PHI Data Breaches, PHI Data Security | Leave a commentDeciphering HIPAA Omnibus Rule Breach Notification
June 26, 2013Despite the new instructions on breach notification in the HIPAA Omnibus Rule, there’s still plenty of uncertainty about what constitutes a “compromise” of data that triggers notification, says privacy attorney Adam Greene. As a partner at Davis Wright Tremaine LLP … Continue reading
Posted in HIPAA Omnibus Rule | Tagged Breach Notification, Environmental Intelligence, Health IT, Health IT Information Security, Health IT Policy, Health IT Services, HIPAA Compliance, HIPAA Omnibus Rule, HIPAA Privacy and Security Rules, PHI, PHI Data Breaches, PHI Data Security, PHI Security | Leave a commentEnvironmental Intelligence Releases May 2013 EI Connections Newsletter
June 3, 2013Environmental Intelligence LLC is pleased to release its May 2013 EI Connections Newsletter. Please send your feedback or suggestions to [email protected]. Click Here to view: May 2013 EI Connections Newsletter Want to automatically receive our monthly newsletter? Click on this link to … Continue reading
Posted in Environmental Intelligence | Tagged CMS, CMS EHR Incentives, CMS Policy, EHR, EHR Adoption, EHR Best Practices, EHR Consulting, EHR Implementation, EHR Incentives, EHR Study, EI Connections Newsletter, Electronic Health Records, Electronic Medical Records, EMR, Environmental Intelligence, Health Information Exchange, Health IT, Health IT Information Security, Health IT Policy, Health IT Services, HHS, HIPAA Compliance, HIPAA Privacy and Security Rules, Meaningful Use, medical practice best practices, ONC, Patient Experience, PHI Data Breaches, PHI Data Security, Stage 2 Meaningful Use Rule | Leave a commentFour Key Steps When Evaluating Encryption For PHI Data Security
May 20, 2013Encryption is an important breach prevention tool. But to make the right decisions about how to apply encryption, healthcare organizations should take four key steps The first step is to precisely identify where all protected health information is stored. Today, … Continue reading
Posted in Environmental Intelligence, PHI Data Security | Tagged CMS Policy, Encryption Solutions, Encryption Technology, Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, HHS, HIPAA Compliance, HIPAA Privacy and Security Rules, HITECH Act, Meaningful Use, Patient Experience, PHI, PHI Data Breaches, PHI Data Security, PHI Security, Stage 2 Meaningful Use Rule | Leave a commentUnsecured Email Transmisions Result In PHI Data Breach
May 14, 2013The Regional Medical Center in Memphis is notifying patients of a HIPAA breach after an employee sent out three unsecure emails containing the protected health information and Social Security numbers of nearly 1,200 patients. The incident occurred between Oct. 29 … Continue reading
Posted in PHI Data Security | Tagged Environmental Intelligence, Health IT Information Security, Health IT Services, HIPAA Compliance, HIPAA Privacy and Security Rules, PHI, PHI Data Breaches, PHI Data Security, PHI Security | Leave a commentHIPAA Omnibus Rule Will Bring More Enforcement
April 9, 2013The HIPAA Privacy and Security final rule — also known as the HIPAA Omnibus Rule — became effective March 26. We predict enforcers will have a heyday with expanded ability to crack down on providers and their business associates. The … Continue reading
Posted in HIPAA Privacy and Security Rule | Tagged Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, Health IT Tips, HIPAA Compliance, HIPAA Privacy and Security Rules, medical practice best practices, OCR, PHI, PHI Data Breaches, PHI Data Security | Leave a commentHIMSS13 Update – OCR Director Discusses HIPAA/HITECH Compliance
March 8, 2013It’s about the patients, it’s about safeguarding privacy, and it’s about trying to avoid making the same mistakes twice, said Office for Civil Rights Director Leon Rodriguez to hundreds of HIMSS13 attendees Monday morning at “A Dialogue On HIPAA/HITECH Compliance: … Continue reading
Posted in HIPAA Complicance | Tagged CMS Policy, EHR, EHR Adoption, EHR Best Practices, EHR Consulting, EHR Implementation, Electronic Health Records, Electronic Medical Records, EMR, Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Services, HIPAA Compliance, HIPAA Privacy and Security Rules, OCR, PHI, PHI Data Breaches, PHI Data Security, PHI Security | Leave a commentHIMSS13 Headline – Healthcare Is The Most Widely Breached Industry In the US
March 4, 2013Attendees at HIMSS13 — in one way or another entrusted with the protection of their patients’ personal health information — may not be pleased to learn that they work in the most widely breached industry in the United States. “The … Continue reading
Posted in PHI Data Security | Tagged Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Services, HIPAA Compliance, HIPAA Privacy and Security Rules, HIT, PHI, PHI Data Breaches, PHI Data Security, PHI Security | Leave a comment ← Older posts Newer posts →