How to Handle HIPAA and Email

How to Handle HIPAA and Email?

Since modifications to the Health Insurance Portability and Accountability Act (HIPAA) were passed in 2013, HIPAA compliance for email has been a fiercely disputed subject. The language of the HIPAA Security Rule, which introduces a number of conditions before email communications can be regarded to be HIPAA compliant, although it does not outright forbid the …

How to Handle HIPAA and Email? Read More »

Reporting a HIPAA Breach

Reporting a HIPAA Breach

Following a breach of unsecured protected health information, HIPAA covered companies and their business associates are required to notify the appropriate authorities in accordance with the HIPAA Breach Notification Rule, 45 CFR 164.400-414. According to section 13407 of the HITECH Act, vendors of personal health records and their third-party service providers are subject to the …

Reporting a HIPAA Breach Read More »

Protected Health Information: How Long Do You Need to Keep Records?

Depending on the services you offer and the reasons you have access to PHI, there are various alternative responses to this question. However, you must keep all Protected Health Information you have handled, saved, or transferred if your company is a Covered Entity, Business Associate, or Business Associate Subcontractor as defined by HIPAA. In these …

Protected Health Information: How Long Do You Need to Keep Records? Read More »

What is Managed HIPAA Compliance

What is Managed HIPAA Compliance – and How Does It Help?

The benchmark for protecting sensitive patient data is set by the Health Insurance Portability and Accountability Act (HIPAA). To achieve HIPAA Compliance, organizations that deal with protected health information (PHI) must put in place and adhere to physical, network, and process security measures. HIPAA compliance is required of all covered entities (those who provide healthcare …

What is Managed HIPAA Compliance – and How Does It Help? Read More »