What are the 18 Identifiers of Protected Health Information?
Individually Identifiable Health Information and Protected Health Information are similar. Here’s how you can tell them apart.
Articles
Stay Up-To-Date On the Latest Trends, Legal Changes, and More.
Individually Identifiable Health Information and Protected Health Information are similar. Here’s how you can tell them apart.
HIPAA exists to regulate protected health information (PHI) and protect patient privacy. While these regulations are essential for the secure transmission of electronic health records (EHR), they can certainly burden covered entities and their business associates.
Threat vectors are the various avenues of breach used by hackers and other cybercriminals to access sensitive information for personal gain.
he Health Information Technology for Economic and Clinical Health (HITECH) Act was passed in 2009 as part of the American Recovery and Reinvestment Act (ARRA).
HHS developed the Breach Notification Rule as an addition to HIPAA to ensure covered entities and business associates take responsibility for and inform patients of breaches to their protected health information. In this article, we’ll go over what your team needs to know to help you ensure complian
Protecting patient PHI is a mandatory aspect of healthcare today, so the Security Rule regulates how and when medical information can be disclosed.
The Privacy Rule was one of the first examples of legislation in the United States that enhanced patient rights. This rule is the first addition to HIPAA, and it continues to shape how medical records are handled. In this post, we will cover what you need to know to be compliant with the Privacy Rule.
Unfortunately, the lack of security and confirmation measures makes texting medical information a threat to HIPAA compliance.
The 21st Century Cures Act requires health IT professionals and organizations to prevent information blocking by making PHI accessible to valid requestors.
Health information exchange (HIE) can refer to an organization that facilitates the exchange of protected health information or the act of exchange.
Of all the methods of medical records release, none pass the records through more hands than shipping via delivery services. It is, of course, illegal for anybody but the recipient to tamper with mail. So is mail a safe method of medical records exchange?
Insourcing the release of information means processing medical records requests using your own team. Our ROI solution makes it easy for your medical staff to hit the ground running with health information exchange and care coordination.
Want to Stay Updated?
Subscribe to our newsletter to learn:
We respect your inbox, so we’ll only reach out to share high-quality content.