In the popular TV series: "8 Simple Rules for Dating My Teenage Daughter," the rules may have been a bit exaggerated but they sure made their point. (Rule #1: Use your hands on my daughter and you'll lose them after).…
Since the Breach Report 2010 portable media is trending as one of the easiest ways find yourself in a data breach scenario.
It is not unusual to have hundreds of Business Associates who have access to ePHI, this creates risk that needs to be accounted for.
Breach Report 2010 documents the major happenings in PHI breaches over the last year.
HITECH, and HIPAA Security Rule combined mean that covered entities need to ensure proper due-diligence when managing BAs.
Web applications are becoming an increasingly big part of healthcare. Because of this is is widening the target for hackers.
Things are heating up over HITECH in the House of Representatives.
The HIPAA Security Rule now applies to Business Associates. Make sure your security testing extends to them as well.
Managing vendors and business partners is hard in any industry, but when the data is sensitive ePHI, you are trying to achieve EHR meaningful use and there are penalties like the HITECH Act's breach notification requirements, it can be even more daunting.
Summary of CHIME's input and Redspin's input on the subject.