Healthcare Cybersecurity News

QI’s Experts talk Cyber, HIPAA Compliance, and everything you need to know to keep your patients safe.

Where In The Cloud Is Your PHI?

Storing Protected Health Information (“PHI”) in the cloud can be a very useful thing for covered entities and business associates.  As we know, HIPAA..

Emergency Preparedness Best Practices

In the wake of two damaging hurricanes, the topic of emergency preparedness is at the top of mind for many Covered Entities and Business Associates...

Can I Send Patient Information To...?

One of the most common questions I hear is, “Can I send patient information to…” with a plethora of situations and organizations completing that..

What To Do About Insecure Business Associates

As a Covered Entity or a Business Associate, you know you need Business Associate Agreements with entities that perform a service or a function for you..

Breach Notification Requirements

Most people in the industry believe HIPAA requires notification of a breach to the federal government and affected individuals within 60 days of discovery..

Take The Gray Out Of HIPAA - Risk Analysis Will Help

Most people with even a casual understanding of HIPAA realize there is a great deal of gray area involved in the implementation of the Rule. This is..

NJPCA Annual Conference

Aug 10, 2017 | Healthcare Compliance

There's More to Know: When You Think, You Know Everything About HIPAA and Data Breach Risks

Guarding Against Insider Threats

Last week Anthem began informing 18,000 customers of a breach. It stemmed from a vendor’s employee who emailed Anthem members’ data to a personal email..

Termination of User Access

Every covered entity and business associate, whether large or small, struggles with prompt termination of user access. Whether it be interns, temporary or..

Implementing Restricted Communications

Far too often HIPAA is used as a barrier for appropriate PHI sharing. However, when a patient wants to create a barrier to sharing in the form of a..