by Gary Pritts | Dec 21, 2015 | General News, HIPAA
The University of Washington Medicine (UWM) has agreed to a $750,000 settlement regarding potential HIPAA violations and a corrective action plan and annual reports on the organization’s compliance efforts. Had effective protection been in place, the breach most likely would not have occurred.
Read More
by Eagle Editor | Dec 20, 2015 | General News, HIPAA
Are you susceptible to a healthcare data breach? More practices and hospitals are finding themselves on the Department of Health and Human Services’ “wall of shame” — a website listing health data breaches affecting 500 or more individuals.
Read More
by Gary Pritts | Nov 30, 2015 | General News, HIPAA
HIPAA rule enforcement is stepping up. On November 25, 2015, Lahey Hospital and Medical Center (Lahey) agreed to settle potential violations of HIPAA regulations for $850,000. This enforcement action highlights the importance of addressing the security of all ePHI, not simply the PHI contained in the electronic medical record.
Read More
by Gary Pritts | Nov 14, 2015 | General News, HIPAA
With the advent of the Meaningful Use program, including the current Stage 2 requirements, healthcare organizations across the country have instituted the annual risk analysis, or risk assessment. When Eagle Consulting Partners conducts a risk analysis, we always seek... Read More
by Eagle Editor | Nov 10, 2015 | General News, HIPAA, HIPAA Policy Templates
Are you a HIPAA business associate with an information technology product or service that needs to stay in compliance with HIPAA policies? According to HHS, a “Business Associate” is defined as a person or entity that performs certain functions or... Read More
by Eagle Editor | Nov 6, 2015 | General News, HIPAA, HIPAA Policy Templates
When it comes to healthcare cyber security, the Government is stepping up audits and taking a closer look at business associates right now. Are you ready? What can you expect as the government changes and updates its rules, and brings a new focus on compliance? Audits. More rule changes. Enforcement. The bottomline is privacy through security.
Read More