Top Menu

HIPAA IT Security Blog

Healthcare 2.0 in 2017

Technology will have a big role to play in serving the biggest, most expensive user group of healthcare: the over-65s. But that technology will have to take into account changes in the consumer and society generally. These are factors IT professionals need to have at the front of their minds in 2017. Older customers today […]

0 comments

Convertibles make health care IT flexible

Computers have traditionally come in one of a few carefully defined forms. Desktop computers are systems that you go somewhere to use. Laptop computers are machines you can carry different places to use. Tablets are devices you can use while standing up. Health care professionals and administrators would choose the platform that would be most […]

0 comments

How to stop ransomware attacks in 2017

The screen shows an ominous message. Your system is locked, and you have hours or a few days to pay the ransom to have it unlocked. Conveniently, there’s a big countdown timer on the screen to help you keep track of how much time you have left. You ask around, and there is indeed no […]

0 comments

HIPAA Security Reminder of the Week

What is PHI? PHI is individually identifiable health information which is created or received by a health care provider, health plan, or health care clearinghouse. Such information relates to the past, present or future physical health, mental health or condition of an individual AND can be directly tied to an individual. PHI either identifies or […]

0 comments

HIPAA Security Reminder of the Week

Logon ID Sharing user IDs and passwords is not advisable and may be a non-compliance with your company policy or local legislation. If you shared this information and someone used it to access ePHI, you will be held responsible for the actions that person took using your credentials. Do not to share network logon ID […]

0 comments

HIPAA Security Reminder of the Week

Treat Paper Records & Electronic Data Equally Sensitive information on paper is the same as sensitive information on a computer. Both need to be protected from unauthorized access and should be treated with caution and discretion. In particular, Protected Health Information (PHI) in all forms (e.g. verbal, fax, paper, electronic) is covered by the HIPAA […]

0 comments

HIPAA TIPS: Mobile Device Compliance Part 1

Use a password or other user authentication You can configure your mobile device to require a password, personal identification number (PIN), or passcode (a pattern you trace with your finger) to gain access to the device. Keep your password, PIN, or passcode a secret, and don’t store them on your mobile device. You can also […]

0 comments

HIPAA Security Reminder of the Week

Check Devices to Ensure They Are in Compliance All desktops, laptops and other mobile computing devices must encrypted. This is to ensure that all devices that access ePHI will be compliance with the HIPAA Security Rule. Verify that your device has been been encrypted. If you are unsure, contact your IT Help Desk @ 610-640-4223 […]

0 comments

HIPAA TIPS: Implementing a Security Management Process – Part 1

Lead Your Culture, Select Your Team, and Learn Designate a Security Officer(s): Your security officer will be responsible for developing and maintaining your security practices to meet HIPAA requirements. The security officer will work with others to protect your patients’ electronic Protected Health Information (ePHI) from unauthorized access. Discuss HIPAA Security Requirements with Your EHR […]

0 comments

HIPAA Security Reminder of the Week

Secure PHI in Patient or Customer Care Areas Do not discuss PHI or customer details in common places such as cafeterias, elevators, parking lots, or outside the facility. Do not leave hard copy files unattended, for example on top of the desk. Review your company Clean Desk Policy. If you must work with hard copy […]

0 comments

HIPAA TIPS: Mobile Device Compliance Part 2

Install and enable encryption What is encryption? Encryption is the conversion of data into a form that cannot be read without the decryption key or password. It is important to encrypt data stored locally on your mobile device (data at rest) and data sent by your mobile device (data in motion) so that it is […]

0 comments

HIPAA Security Reminder of the Week

Social Networking Safety Social engineering is quickly becoming the most common way the “bad guys” are breaking into systems. Our systems are good at keeping the bad guys out. But it’s much harder to keep them out once you’ve let them in by visiting infected websites, clicking on links or attachments in emails, or responding […]

0 comments

HIPAA TIPS: Implementing a Security Management Process – Part 2

Document Your Process, Findings, and Actions The HIPAA Security Rule requires you to document your risk analysis and HIPAA-related policies, procedures, reports, and activities. Also, if you are attesting for Meaningful Use, you are required to retain all records that support attestation. Review Existing Security of ePHI (Perform Security Risk Analysis) In the risk analysis […]

0 comments

HIPAA Security Reminder of the Week

Protecting a Patient’s Privacy Well-known individuals or celebrities have the same rights to privacy as anyone else. Privacy violations involving celebrities are further complicated due to the higher exposure that may follow these types of patients. Remember: Do not access a patient record unless it is necessary in order to perform your job. Do not […]

0 comments

Preparing for the new analytical doctor

A new generation of doctors and medical students is changing the way data informs: The doctors’ interpretations of the information they have The treatment plans the make These changes in approach can carry significant implications for the IT systems that support all those decisions. Network implications Much of the heavy lifting for advanced healthcare analytics […]

0 comments

HIPAA TIPS: Mobile Device Compliance Part 3

Install and activate remote wiping and/or remote disabling What is remote wiping? Remote wiping is a security feature that enables you to remotely erase the data on the mobile device if the device is lost or stolen. When you enable remote wipe feature on your mobile device, you have the ability to permanently delete data […]

0 comments

HIPAA Security Reminder of the Week

Clean Desk Policy Keep the minimum amount of paper PHI on your desk – only the documents you are working on at the moment. Why? A clean desk produces a positive image – you are organized and respect patients’ privacy. Sensitive documents left in the open can be stolen by a malicious entity. Remember to: […]

0 comments

HIPAA TIPS: Implementing a Security Management Process – Part 3

Manage and Mitigate Risks Implement Your Action Plan Your action plan should address all five HIPAA security components. Follow your action plan and support ongoing efforts to identify, assess, and manage risks. Prevent Breaches by Educating and Training Your Workforce All of your workforce members — employees, volunteers, trainees, and contractors — need education and […]

0 comments

HIPAA Security Reminder of the Week

Information Systems are a Privilege Your access to information “assets” such as hardware, software, storage media, etc. is a privilege. Use of company-owned software and hardware is for legitimate, job-related activity only. Protect this privilege! Guard your authentication credentials – username, password, ID badge, key fob, etc. Do not share your credentials with any other workforce […]

0 comments

HIPAA TIPS: Mobile Device Compliance Part 4

Disable and do not install or use file sharing applications What is file sharing? File sharing is software or a system that allows individual users of the Internet to connect to each other and trade files. Why should you disable and not install or use file sharing applications? File sharing can enable others to access […]

0 comments

HIPAA Security Reminder of the Week

Information Security Reminder Spring is upon us. And while most of us look forward to enjoying the time, scammers and hackers are hard at work trying to foil that enjoyment. Here are a few reminders to help you foil the attackers: • Ensure that your home computer systems are protected with the most current antivirus/anti-malware products. […]

0 comments

SaaS or on-premises? The security challenge for healthcare applications

The healthcare industry faces a difficult paradox when it comes to IT services. Healthcare has some of the most tightly governed restrictions on how information is managed, but it runs the risk of not delivering services effectively enough if it can’t access modern IT service options. There are pros and cons of using cloud-based and […]

0 comments

HIPAA TIPS: Implementing a Security Management Process – Part 4

Attest for Meaningful Use Security-Related Objective You can register for the Meaningful Use Programs anytime, but to attest, you must meet the Meaningful Use requirements for an EHR reporting period. So, only attest after you have conducted your security risk analysis (or reassessment), corrected any identified issues, and documented those changes. Monitor, Audit, and Update […]

0 comments

HIPAA Security Reminder of the Week

Secure Paper Protected Health Information (PHI) too! Sensitive information on paper is the same as sensitive information on a computer. Both need to be protected from unauthorized access and should be treated with caution and discretion. In particular, protected health information (PHI) in all forms (e.g., verbal, fax, paper, electronic) is covered by the HIPAA […]

0 comments

Simplifying security with cloud-based management

Mobile devices improve patient care but broaden the target for hackers. They can also be stolen and lost. Plenty of examples of all three breach types are found on the U.S. Department of Health and Human Services’ “Wall of Shame.” The theft of just one portable device from an Illinois business associate in 2010 compromised […]

0 comments

HIPAA TIPS: Mobile Device Compliance Part 5

Install and enable a firewall What is a firewall? A personal firewall can protect against unauthorized connections by intercepting incoming and outgoing connection attempts and blocking or permitting them based on a set of rules. Why should you enable or install a firewall? When you enable or install a firewall, you increase the security for […]

0 comments

Phishing Attack Results in $400,000 HIPAA Breach Fine

A Denver, Colo.-area network of public health clinics paid a $400,000 HIPAA breach penalty after a phishing attack let a hacker gain access to employee email accounts and obtain electronic protected health information (ePHI) of 3,200 patients, federal authorities said today. Metro Community Provider Network (MCPN) – which provides primary medical care, pharmacies, social work, […]

0 comments

HIPAA Security Reminder of the Week

Protect Yourself from Data Security Breaches By monitoring your accounts regularly, you can respond quickly if hackers attempt to use your information.   Security Tips: Pay attention to “last logged in” info. Sign up for electronic alerts. Consider a credit monitoring service. Freeze your credit. Change your passwords regularly. Think twice before giving out personal […]

0 comments

Obfuscation makes the cloud work for healthcare

Patient data is sacred when it comes to healthcare. HIPPA tells us so. In virtually every medical practice, cost controls are also sacred, and there are points where regulation and modern tools for reducing IT costs can come into conflict. Remote and cloud-based record processing is common in many fields, but adoption in healthcare has […]

0 comments

HIPAA Security Reminder of the Week

HHS Guidance on Sharing Mental Health Information of a patient The HHS Office for Civil Rights published guidance that addresses some of the more frequently asked questions about when it is appropriate under the HIPAA Privacy Rule for a health care provider to share the protected health information of a patient who is being treated […]

0 comments

HIPAA TIPS: Mobile Device Compliance Part 6

Install and enable security software What is security software? Security software protects against malicious software such as viruses, spam and malware. A virus is a self-replicating program that runs and spreads by modifying other programs or files. Spam is the abuse of electronic messaging systems. It is electronic junk mail. Malware is a program that […]

0 comments

Malvern PA: Stolen Laptop Leads to $2.5 Million HIPAA Breach Penalty

The theft of a laptop computer containing information of nearly 1,400 patients was among two HIPAA breaches that led a Pennsylvania provider of remote heart monitoring to pay $2.5 million, federal authorities said this week. Malvern-based CardioNet, Inc., essentially had no process at all for securely managing electronic protected health information (ePHI) of the patients […]

0 comments

HIPAA Security Reminder of the Week

Sanction Policy Both the HIPAA Security Rule and the HIPAA Privacy Rule require Covered Entities and Business Associates to document the disciplinary policy and apply sanctions against members of the workforce who violate the respective regulations.   Sanctions may be applied if you: Access PHI that is not necessary for your job – this includes activities like […]

0 comments

HIPAA Security Reminder of the Week

Breach of PHI Assessment 4-Factor Requirement Do you think there’s been a breach of PHI?   Follow these guidelines to determine if PHI has been compromised: Look at the nature and extent of the PHI involved, including the types of identifiers and the likelihood of re-identification. Find out who accessed the PHI. Was the person […]

0 comments

HIPAA TIPS: Mobile Device Compliance Part 7

Keep your security software up to date Why should you keep security software up to date? Security risks and threats are changing rapidly. By updating your security software you know that you have the latest tools to prevent unauthorized access to health information on your mobile device. How can you keep security software up to […]

0 comments

HIPAA Security Reminder of the Week

Where do we place servers that store ePHI? When determining the location of servers with PHI or PII, consider these two main factors: physical and environmental protection. Physical protection should be focused on preventing unauthorized individuals from accessing the server (e.g. storing the server in locked room accessible only to staff). Environmental protection should focus on protecting […]

0 comments

HIPAA Security Reminder of the Week

Tailgating/Access Card Usage Tailgating is one of the most common physical security breaches. It starts out innocently – an employee opens a door and holds it open for other employees, visitors without badges, or the passive acceptance of a uniformed worker. The problem with these lax situations is that they open your facility to undocumented […]

0 comments