HIPAA Network Security
For a HIPAA covered entity (i.e., a health provider), there is often a direct relationship between the health of the network and the health of the [...]
For a HIPAA covered entity (i.e., a health provider), there is often a direct relationship between the health of the network and the health of the [...]
Healthcare entities are often the target of ransomware attacks. Ransomware attacks occur when a hacker enters an organization's network, encrypting or stealing sensitive data, demanding a sum of money [...]
Under the HIPAA Privacy Rule, a covered entity may, in some circumstances, be liable for its business associate breach under the business associate agreement. When May [...]
Protected health information (PHI) is any individually identifying health information classified by the Department of Health and Human Services (HHS) into 18 identifiers, such as name, [...]
The HIPAA Privacy Rule permits patients to request that PHI contained in their medical records, be amended. The right is not unlimited, however, and a covered [...]
HIPAA Role-Based Access is a key concept of the HIPAA Security Rule. Under the Security Rule, healthcare organizations are required to implement access controls. Role-based access controls [...]
A recent report from Ciitizen, a patients’ rights advocacy group, has revealed more than half of healthcare providers (51%) are not fully compliant with the HIPAA Right of Access [...]
The Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) reported 34 December healthcare breaches, affecting 313,249 patients. Of the reported incidents, there were 18 breaches [...]
Banner Health is a non-profit healthcare organization based in Phoenix, Arizona. It operates a total of 34 hospitals and specialized facilities across six states. Banner employs [...]
Cloud service providers (CSP) are businesses that provide network services, business applications, or infrastructure, in the cloud. The services are hosted in a remote data center that can be [...]