HIPAA Blog Posts: HIPAA Compliance Online Software
An administrator for the Indiana State Medical Association who was transporting unencrypted data on a laptop and two hard drives to an off-site location as part of their disaster recovery program had their car burglarized. The net result is 38,000 patient records stolen and a major HIPAA breach.
Medical Identity Theft is an iatrogenic condition that could be caused by your physician's office. If the office is not HIPAA compliant your medical record could be stolen and used for medical identity theft. This could cause severe symptoms such as fiscal stress and anxiety.
HIPAAssure™ is the new name for the complete line of HIPAA compliance services from Compliance Helper. It is vital that a company can assure that they are HIPAA compliant on an on-going basis, not only for their own peace of mind, but also to assure their clients and business partners.
There are many approaches to getting HIPAA compliant but an on-line method provides the most efficient and cost effective method of getting HIPAA compliant, staying HIPAA compliant, and proving HIPAA compliance.
Our free HIPAA compliance checklist can be a handy quick reference to your current level of HIPAA compliance. With all the changes brought about by the HIPAA Omnibust Rule your policies and procedures may be out of date. So download it today at www.compliancehelper.com/compliance-checklist .
Getting business associates HIPAA compliant in as little as 8 days requires technology, methodology and sound advice. Our partner, Rebecca Herold, CISSP, CIPP/US, CIPP/IT, CISM, CISA, FLMI, www.theprivacyprofessor.com was rated the number 3 privacy and security consultant in the world by Computerworld..
Disruptive innovation can provide low cost and efficient methods for HIPAA HITECH and Omnibus Rule compliance. The old model involved sending a consultant to the client with a policy and procedure manual under their arm but with SaaS or the cloud model we can send the consultant and the content over the Internet with interactive software.
"Obtaining a seal is a “place in time” controls assessment. Material changes to the environment would trigger another audit, as a 3rd party cannot attest to effective controls if an entity changes them. To compensate, material changes need to coincide with audit review cycles, which may not align with business objectives." The Compliance Meter displays the current level of HIPAA compliance in four key areas; policies, procedures, and forms up to date, and HIPAA compliance tasks up to date.
It is estimated that the majority of MU attestations by practices and small clinics have falsely attested to core measure 15 of meaningful use. It states the organization must: “Conduct or review a security risk analysis in accordance with the requirements under 45 CFR 164.308 (a)(1) and implement security updates as necessary and correct identified security deficiencies as part of its risk management process.”(FR Vol. 75, No. 144 / 7/28/2010, p 44568).