Tag Archives: PHI
← Older posts Newer posts →No Encyption Leads To Second Largest Healthcare Data Breach
August 27, 2013The recent theft of four unencrypted desktop computers from a Chicago area physician group practice may result in the second biggest healthcare breach ever reported to federal regulators. But the bigger issue is: Why do breaches involving unencrypted computer devices … Continue reading
Posted in PHI Data Security | Tagged Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, HIPAA Compliance, HIPAA Privacy and Security Rules, medical practice best practices, PHI, PHI Data Breaches, PHI Data Security | Leave a commentPerspectives On Cloud Computing And HIPAA Compliance In Healthcare
August 22, 2013There is a fair amount of uncertainty about adopting cloud services in healthcare, especially around sensitive health data. While the federal government’s rules are complicated, we know for a fact there’s nothing inherently dangerous about the technology. The term “cloud … Continue reading
Posted in Cloud Computing | Tagged Cloud Computing, cloud hosting, cloud services, Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, HIPAA Compliance, HIPAA Privacy and Security Rules, PHI, PHI Data Breaches, PHI Data Security | Leave a commentBest Practices For Healthcare Organizations To Be HIPAA Audit Ready
August 21, 2013Keeping risk assessment documentation and other compliance evidence in a centralized repository is a good way to prepare for any HIPAA audit or investigation, says Mark Dill, Cleveland Clinic’s security leader. While the Cleveland Clinic was not one of the … Continue reading
Posted in HIPAA Complicance | Tagged Business Associate, Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Policy, Health IT Services, HIPAA Compliance, HIPAA Omnibus Rule, HIPAA Privacy and Security Rules, PHI, PHI Data Security | Leave a commentHybrid Cloud Infrastructures Offers Attractive Options For Healthcare
August 16, 2013Many healthcare companies are using a range of infrastructure services to meet their changing IT needs. This usually begins with storing data in an in-house data center then moving to collocation in an outsourced data center. This then may lead … Continue reading
Posted in Cloud Computing | Tagged Cloud, Cloud Computing, cloud hosting, Cloud IaaS, cloud services, Environmental Intelligence, HA cloud services, Health IT, Health IT Services, HIPAA Compliance, hybrid cloud, PHI, PHI Data Security | Leave a commentEnvironmental Intelligence Releases July 2013 EI Connections Newsletter
July 31, 2013Environmental Intelligence LLC is pleased to release its June 2013 EI Connections Newsletter. Please send your feedback or suggestions to [email protected]. Click Here to view: July 2013 EI Connections Newsletter Want to automatically receive our monthly newsletter? Click on this link to … Continue reading
Posted in Environmental Intelligence | Tagged CMS, CMS EHR Incentives, CMS Policy, EHR, EHR Adoption, EHR Consulting, EHR Implementation, EI Connections Newsletter, Electronic Health Records, Electronic Medical Records, EMR, Environmental Intelligence, Health IT, Health IT Information Security, Health IT Policy, Health IT Services, HIE, HIPAA Compliance, Meaningful Use, PHI, Stage 2 Meaningful Use Rule | Leave a commentONC Releases 2014 Health IT Privacy & Security Priorities
July 24, 2013Want to know what the Office of the National Coordinator for Health IT’s privacy and security priorities are for the coming year? Then take a look at the ONC’s new report to Congress. Click here to view the ONC report. … Continue reading
Posted in ONC | Tagged CMS EHR Incentives, CMS Policy, EHR, EHR Adoption, EHR Consulting, EHR Implementation, Electronic Health Records, Electronic Medical Records, EMR, Environmental Intelligence, Health IT, HIPAA Compliance, HIPAA Privacy and Security Rules, Meaningful Use, ONC, PHI, PHI Data Security | Leave a commentNIST Releases Voluntary Standards For IT Infrastructure Security
July 8, 2013The National Institute of Standards and Technology (NIST) is circulating a draft of voluntary standards it is developing for the critical infrastructure of IT security. The framework, when fully developed, will outline security functions and standards based on a risk-management … Continue reading
Posted in Healthcare Information Security | Tagged Environmental Intelligence, Health IT Best Practices, Health IT Information Security, Health IT Services, PHI, PHI Data Security, PHI Security | Leave a commentDeciphering HIPAA Omnibus Rule Breach Notification
June 26, 2013Despite the new instructions on breach notification in the HIPAA Omnibus Rule, there’s still plenty of uncertainty about what constitutes a “compromise” of data that triggers notification, says privacy attorney Adam Greene. As a partner at Davis Wright Tremaine LLP … Continue reading
Posted in HIPAA Omnibus Rule | Tagged Breach Notification, Environmental Intelligence, Health IT, Health IT Information Security, Health IT Policy, Health IT Services, HIPAA Compliance, HIPAA Omnibus Rule, HIPAA Privacy and Security Rules, PHI, PHI Data Breaches, PHI Data Security, PHI Security | Leave a commentBest Practices On Avoiding Large OCR HIPAA Fines
May 24, 2013What determines the size of a penalty for HIPAA violations? The key factors are the lack of a timely risk assessment and the failure to address ongoing security issues, says Leon Rodriguez, director of the Department of Health and Human … Continue reading
Posted in HIPAA Complicance | Tagged Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, Health IT Tips, HIPAA Compliance, HIPAA Privacy and Security Rules, medical practice best practices, OCR, OCR Audits, PHI, PHI Data Security, PHI Security | Leave a commentFour Key Steps When Evaluating Encryption For PHI Data Security
May 20, 2013Encryption is an important breach prevention tool. But to make the right decisions about how to apply encryption, healthcare organizations should take four key steps The first step is to precisely identify where all protected health information is stored. Today, … Continue reading
Posted in Environmental Intelligence, PHI Data Security | Tagged CMS Policy, Encryption Solutions, Encryption Technology, Environmental Intelligence, Health IT, Health IT Best Practices, Health IT Information Security, HHS, HIPAA Compliance, HIPAA Privacy and Security Rules, HITECH Act, Meaningful Use, Patient Experience, PHI, PHI Data Breaches, PHI Data Security, PHI Security, Stage 2 Meaningful Use Rule | Leave a comment ← Older posts Newer posts →