Legal, Financial, and Criminal Consequences for HIPAA Violations

Protecting patients’ private health information has become a major concern for most of the world. That’s because this information and data, otherwise known as “protected health information” (PHI) and electronic protected health information” (e-PHI), has increasingly become a primary target of a variety of hackers and scammers. And while this data and information is protected […]

The HITECH Act’s Health IT Infrastructure Standards and Requirements

The HITECH (Health Information Technology for Economic and Clinical Health) Act was passed in 2009 as part of the American Recovery and Reinvestment Auto of 2009 (ARRA). This piece of legislation was created to accelerate the adoption of electronic health records (EHRs), and its supporting technology, in U.S. healthcare organizations. The 7 major goals of the HITECH […]

HIPAA Security Rule Part 2: General Data Security Rules for Electronic Protected Health Information

In part 1 of the HIPAA Security Rule blog series, we introduced you to healthcare data security basics, or in other words, what the HIPAA Security Rule is, what the primary objectives are, and what kind of information is protected by the HIPAA Security Rule. Below, and as part 2 of this series, we are […]

HIPAA Security Rule Part 1: An Intro to Data Security for Electronic Protected Health Information

Information and data security are hugely important topics, and no group knows that more than those who work in the healthcare field. Whether it’s who physicians and healthcare providers can talk to about a specific patient’s care, how to protect your healthcare facility from healthcare data hackers, or how to secure individuals’ “electronic protected health […]