What is Reasonable and Appropriate under the HIPAA Security Rule?
I am often faced with the following question from customers: "Can you tell me specifically what we need to do to comply with HIPAA’s information system activity review requirement…What is ‘reasonable...
View ArticleHow To Justify Your Patient Privacy Program
When I talk to the privacy staff at healthcare organizations, they tell me that they understand the benefits of using technology for their patient privacy program, but they’re having a difficult time...
View ArticleRiding the Magic Omnibus
Every day I want to cry (too much Omnibus)How can I protect your PHI (too much Omnibus)I'm confused and at a loss (too much Omnibus)So can you please explain Omnibus (too much Omnibus)
View ArticlePrivacy breaches cost $5.6 billion a year
$5.6 billion. $5,600,000,000. Seeing the amount, instead of just reading the amount, gives it more meaning — at least to me it does. That rather large number is how much privacy breaches cost the...
View ArticleAre You Ready for the Return of OCR’s HIPAA Audit Program?
One thing is for sure…you don’t want to wait until you get a notification letter from the Office for Civil Rights (OCR) to start preparing for a HIPAA compliance audit. Organizations that are going...
View ArticleCould Your Organization Demonstrate HIPAA Compliance?
On September 30th, CynergisTek and Iatric Systems teamed up to host a complimentary webinar, “How to Prepare Your Organization for an OCR HIPAA Audit.” In this informative session, industry expert Mac...
View ArticleMy Trip to the Clinic and Protecting Patient Privacy
One internal value that has always been strong at Iatric Systems is that our Founder and CEO, Joel Berman, cares for his “family” by providing the best healthcare insurance and wellness plans...
View ArticleRisk Based Patient Privacy Monitoring
Healthcare Privacy and Information Security programs have evolved substantially in recent years. This is due not only to the requirements of Meaningful Use, HIPAA, and HITECH, but due to the growing...
View ArticleMap Your Way to a Successful Patient Privacy Program
I have had many conversations with our customers regarding patient privacy monitoring, including the importance of capturing and mapping key data elements such as Guarantor/Subscriber, Next of Kin, and...
View Article4 Ways To Reduce the Number of Patient Privacy Audits
We all know that as EMRs replace paper records, it is impossible to manually review millions of audit logs to check for potential patient privacy breaches. As a result, in the past, most organizations...
View ArticleReducing Improper Access of Patient Records by 98%
When hospital clinicians are accessing patient records thousands of times daily, how do you spot the access that’s questionable or worse?
View ArticleWhy You Should Embrace an OCR Audit
News that your organization could be facing an audit is usually cause for anxiety and much gnashing of teeth. At best, it means scrambling to assemble the required information before the deadline...
View ArticleOCR is doing a good thing by making us “Eat our Vegetables”
Healthcare is, at its core, based on relationships. And, as with any relationship, trust is foundational to building and maintaining a strong relationship. Trust can be fragile and fleeting. It can be...
View ArticleHealthcare — today's biggest ransomware target
It's no surprise to me that healthcare is now a prime target of cyber-criminals using ransomware to extort money. They want to go after a business that cannot function without access to its data and...
View ArticleSecurity app helps hospital pass CMS risk assessment, HIPAA audit
Iatric Systems customer, Ed Ricks, CIO of Beaufort Memorial, shares that “technology can produce useful details to further prove your privacy compliance efforts to federal auditors.”
View ArticleOCR to Expand Compliance Reviews of Small Healthcare Breaches
The Health and Human Services (HHS) Office for Civil Rights (OCR) announced in August, that it has launched a new initiative to more widely investigate HIPAA breaches of protected health information...
View ArticleDo Your Partners Handle PHI With Care? Not Sure?
A great deal of your hospital’s patient information is now handled by outside partners — physician practices, outside labs, insurance companies, and many others. In an ideal world, you could trust...
View ArticleUse Patient Trust as a Competitive Advantage
I recently read this article from HealthData Management — Privacy, security issues cause consumers to distrust HIT — published on January 9th, 2017.With all the news going on today about ransomware and...
View ArticleHow Beaufort Memorial Hospital Handles Vendor Risk Management
Recently, Ed Ricks, CIO at Beaufort Memorial Hospital had an interview with Marianne Kolbasuk McGee with HealthcareInfo Security.It is a very relevant and timely discussion since The Department of...
View ArticleAre you monitoring user reporting in MEDITECH’s Data Repository?
In my experience, hospitals typically don't add any kind of PHI access logging to their Data Repository reports. This seems like a gap in PHI monitoring. It may be true that HIPAA provides an exemption...
View Article