HIPAA Wiki: A Brief Summary of HIPAA Rights
The Hawaiian language has a memorable equivalent of the English word for “fast”: “wikiwiki.” The term “wikiwiki” can be spoken quickly. Similarly, when a person looks up a “wiki” [...]
The Hawaiian language has a memorable equivalent of the English word for “fast”: “wikiwiki.” The term “wikiwiki” can be spoken quickly. Similarly, when a person looks up a “wiki” [...]
Recently, many organizations have begun to wonder if a risk assessment is mandatory. This in part is due to misinformation on some websites that claim that a HIPAA mandatory [...]
Under the HIPAA Security Rule, covered entities and business associates are required to implement appropriate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security [...]
The HIPAA Security Rule requires that covered entities (health plans, healthcare clearinghouses, and healthcare providers who electronically transmit any health information in connection with a HIPAA related transaction) and [...]
For a HIPAA covered entity (i.e., a health provider), there is often a direct relationship between the health of the network and the health of the [...]
A managed service provider (MSP) is an entity that remotely manages a covered entity’s IT infrastructure, and/or end-user systems. Managed service providers who work with clients [...]
The HIPAA Security Rule requires that covered entities (health plans, healthcare clearinghouses, and healthcare providers who electronically transmit any health information in connection with a HIPAA [...]
Under the HIPAA Security Rule, covered entities must implement security safeguards to protect the confidentiality, integrity, and availability of electronic protected health information (ePHI). ePHI is [...]
PHI in transit consists of either paper documents or records, or portable media and devices. The physical safeguard provisions of the HIPAA Security Rule require covered entities to protect [...]
The HIPAA Security Rule contains administrative safeguards in the form of security standards. One of these standards requires covered entities and business associates to implement a [...]