Over the last several weeks we have discussed a wide variety of things you need to do maintain the privacy of Protected Health Information (“PHI”) and..
The decision to allow mobile devices to access and/or store PHI is a critical one. The ease of access to the information must be balanced with the..
No one likes to dwell on PHI being mishandled or inappropriately accessed, but it is important to have a plan if the situation does occur. Incidents..
A recent study by the U.S. Government Accountability Office showed that patients still face confusion, high fees, and delays in getting access to..
We spend significant time discussing important items to do and things to consider in securing Protected Health Information (“PHI”). This assumes one..
Effective access control is a fundamental part of securing Protected Health Information (“PHI”). Access control is essentially giving access when and..
Transferring PHI without an executed Business Associate Agreement ("BAA") has become a point of intense focus for federal regulators, and one from..
The proper destruction of electronic Protected Health Information (“ePHI”) is often overlooked and, if done improperly, can lead to impermissible..
Recent events indicate what we have long suspected; attackers often target the same organizations again after a successful attack. This exact scenario..