Tag Archives: PHI Security
Newer posts →OCR Wramps Up HIPAA Privacy and Security Audits
July 5, 2012Federal enforcers are preparing to audit healthcare organizations for how well they establish and follow privacy and security practices and data breach notification standards. The Office of Civil Rights published the procedures to be assessed when examiners conduct performance audits … Continue reading
Posted in PHI Data Security | Tagged Environmental Intelligence, Health IT, Health IT Best Practices, HHS, HIPAA, HIPAA Compliance, HIPAA Privacy and Security Rules, HIPAA Violations, medical practice best practices, OCR, PHI, PHI Data Security, PHI Security | Leave a commentEnvironmental Intelligence Releases June 2012 Newsletter
June 29, 2012Environmental Intelligence LLC is pleased to release its June 2012 EI Connections Newsletter. Please send your feedback or suggestions to [email protected]. Click Here to view: June 2012 EI Connections Newsletter Want to automatically receive our monthly newsletter? Click on this link to … Continue reading
Posted in Environmental Intelligence | Tagged CMS, CMS EHR Incentives, CMS Policy, EHR Adoption, EHR Best Practices, EHR Consulting, EHR Implementation, EHR Incentives, EHR Technology Enhancements, EI Connections Newsletter, Electronic Health Records, Electronic Medical Records, EMR, Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, HHS, HIPAA Compliance, HIT, ICD-10, ICD-11, Meaningful Use, medical practice best practices, ONC, PHI, PHI Data Breaches, PHI Security, State of Texas, Texas DIR Contract | Leave a commentCertified IT Recycling Dramatically Reduces The Risk Of PHI Data Breaches
June 26, 2012The article, How to avoid a health data spill when recycling IT, Steve Skurnac, President, SIMS Recycling Solutions, does a fine job offering the background, justification and the importance for medical organizations to develop and implement sound IT recycling policies … Continue reading
Posted in PHI Data Security | Tagged Certified It Recycling, Destruction Beyond Hard Drives, Environmental Intelligence, HDD, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, Health IT Tips, Healthcare, HIPAA Compliance, PHI, PHI Data Breaches, PHI Data Security, PHI Security | Leave a commentReported PHI Data Breaches in 2012 is Staggering
June 5, 2012As the movement to digitize the U.S. health care system continues to build strong momentum, it is imperative that physician practices and medical organizations include data security as part of their health IT strategy. What the data will show is … Continue reading
Posted in PHI Data Security | Tagged Environmental Intelligence, Health IT, Health IT Information Security, Health IT Services, Healthcare, Managed Network Services, PHI, PHI Data Breaches, PHI Data Security, PHI Security | Leave a commentEnvironmental Intelligence Releases May 2012 Newsletter
May 31, 2012Environmental Intelligence LLC is pleased to release its May 2012 EI Connections Newsletter. Please send your feedback or suggestions to [email protected]. Click Here to view: May 2012 EI Connections Newsletter Want to automatically receive our monthly newsletter? Click on this link to … Continue reading
Posted in Environmental Intelligence | Tagged CMS, CMS EHR Incentives, CMS Policy, EHR, EHR Adoption, EHR Consulting, EHR Hosting, EHR Implementation, EHR Incentives, EI Connections Newsletter, Electronic Health Records, Electronic Medical Records, EMR, Environmental Intelligence, Health Information Exchange, Health IT, Health IT Information Security, Health IT Policy, Health IT Services, Health IT Standards, Healthcare, HHS, HIE, HIE Standards, HIT, ICD-10, Meaningful Use, medical practice best practices, ONC, PHI Security, Stage 2 Meaningful Use Rule | Leave a commentEnvironmental Intelligence Releases April 2012 Newsletter
April 30, 2012Environmental Intelligence LLC is pleased to release its April 2012 EI Connections Newsletter. Please send your feedback or suggestions to [email protected]. Click Here to view: April 2012 EI Connections Newsletter Want to automatically receive our monthly newsletter? Click on this link to … Continue reading
Posted in Environmental Intelligence | Tagged CMS EHR Incentives, CMS Policy, EHR, EHR Adoption, EHR Cloud Hosting, EHR Consulting, EHR Hosting, EHR Implementation, EHR Incentives, EI Connections Newsletter, Electronic Health Records, Electronic Medical Records, EMR, Environmental Intelligence, Health Information Exchange, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, HHS, HIE, HIPAA Compliance, ICD-10, Meaningful Use, medical practice best practices, PHI, PHI Data Breaches, PHI Security, Stage 2 Meaningful Use Rule | Leave a commentBest Practices for PHI Data Security and Selecting the Right Cloud Computing Provider
April 27, 2012In recent months, cloud computing is a topic that is getting a lot of attention especially when applying the technology in healthcare. Cloud computing is becoming more attractive to medical organizations predominately due to the benefits that the technology offers … Continue reading
Posted in Cloud Computing | Tagged Cloud, Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Services, Health IT Tips, HIPAA Compliance, medical practice best practices, PHI, PHI Security | Leave a commentHIMSS Study Reveals PHI Breaches Are On The Rise
April 12, 2012A recent study from HIMSS Analytics and Kroll Advisory Solutions found that medical organizations are far behind with respect to having sound privacy protections in place. The study along with data from The Office for Civil Rights (OCR), the department … Continue reading
Posted in Healthcare Information Security | Tagged EHR, EHR Consulting, Electronic Health Records, Electronic Medical Records, EMR, Health IT, Health IT Information Security, Health IT Policy, HHS, HIPAA Compliance, HIPAA Privacy and Security Rules, Managed Network Services, medical practice best practices, PHI Data Breaches, PHI Security | Leave a comment Newer posts →