Data Destruction and HIPAA Competence as Related to IT Support Companies: HIPAA & HITECH Act Blog by Jonathan P. Tomes with Guest Commentator Michael B. O’Hara, CISSP
Michael B. O’Hara’s narrative, part 1: Recently, my company, KB Computing, LLC, lost a managed services client. The reason, as it so often is, was .. read more
Does DHHS Expect Email Encryption? HIPAA & HITECH Act Blog by Jonathan P. Tomes, along with guest commentator Brent Sadler, CIO at Veterans Press
One of our HIPAA clients/customers asked the following question through our Veterans Press website: “We have clients’ identifiable information that needs to be sent via .. read more
Phase II Audits: HIPAA Privacy, Security, and Breach Notification Heads Up: HIPAA & HITECH Act Blog by Jonathan P. Tomes
Section 13411 of the HITECH Act requires the Department of Health and Human Services (“DHHS”) to audit covered entities and business associates to ensure that .. read more
Hands-on HIPAA Compliance Workshop: HIPAA & HITECH Act Blog by Jonathan P. Tomes
Is your organization’s HIPAA compliance lost at sea? As you may know, EMR Legal, Inc., is offering our 2-day Hands-on HIPAA Workshop October 16-17 aboard .. read more
Next Stage of DHHS Audits Coming: HIPAA & HITECH Act Blog by Jonathan P. Tomes
The U.S. Department of Health and Human Services (“DHHS”) Office for Civil Rights (“OCR”) has not yet published an audit protocol for this year’s Phase .. read more
Can You Skype and Be HIPAA Compliant? HIPAA & HITECH Act Blog by Jonathan P. Tomes
Well, you certainly can if you don’t disclose any PHI when communicating by Skype. But if you want to use Skype as a form of .. read more
OIG Slams DHHS Again for Not Enforcing HIPAA Adequately! HIPAA & HITECH Act Blog by Jonathan P. Tomes
On November 21, 2013, the Department of Health and Human Services (“DHHS”) Office of the Inspector General (“OIG”) issued another scathing report about the DHHS .. read more
Gap Analysis Is Key to Effective Risk Analysis: HIPAA & HITECH Blog by Jonathan P. Tomes
An effective Risk Analysis is the absolute key to HIPAA compliance, and an effective Gap Analysis is the absolute key to an effective Risk Analysis. .. read more
HIPAA Compliance Training and Onsite Audit “Road Warrior” Report: HIPAA & HITECH Act Blog by Jonathan P. Tomes with Guest Commentator Richard D. Dvorak
Lately, I’ve been traveling a lot to help EMR Legal’s clients stay up to date in their HIPAA compliance requirements in light of the new .. read more
DHHS Issues New Guidance on De-identification
On November 26, 2012, the Department of Health and Human Services (“DHHS”) issued new guidance on the de-identification of protected health information (“PHI”). Its intent .. read more