Let’s face it, most passwords are not secure and that’s a huge problem when it comes to HIPAA. The HIPAA Security rules require covered entities and business associates to provide a “unique identifier” of all users in its information systems.
Healthicity Blog
Subscribe for Healthcare News, Simplified.
Search Results from the Blog
Posts about hipaa (9):
Two Essential Tools to Protect Your Patient’s ePHI
January 19, 2017 | Posted by :
Steve Spearman
Lessons from the UMass Resolution Agreement
December 13, 2016 | Posted by :
Steve Spearman
Why Outsource Your Risk Analysis?
September 22, 2016 | Posted by :
Steve Spearman
Are You Ready For HIPAA Stage 2 Audits?
June 2, 2016 | Posted by :
Steve Spearman
Back in 2012, the Office of Civil Rights implemented a HIPAA Audit pilot program mandated by HITECH, the legislation that also created the Meaningful Use Program.
The Danger of Confusing Compliance for Security
May 26, 2016 | Posted by :
Steve Spearman
HIPAA Explainer Series: HIPAA Compliance Q&A (Part 3)
May 18, 2016 | Posted by :
Steve Spearman
HIPAA Explainer Series: HIPAA Compliance Q&A (Part 2)
May 10, 2016 | Posted by :
Steve Spearman
In our recent HIPAA webinar, HIPAA Compliance Essentials, I talked about navigating the muddy waters of HIPAA Security and Privacy rules.