HIPAA Security Rule Series Part 3: Technical Safeguards
Do you know if you are meeting the requirements of everything in the HIPAA Security Rule?
Compliance Officers — you may want to go ahead and schedule a meeting with your IT director to review this information on technical safeguards for your hospital or practice.
Everyone knows that we live in a digitally dominated world. This applies to your personal information, your banking and shopping, and is now a predominant factor in medical records. When traditional protected health information (PHI) becomes digital, it is rebirthed as electronic personal health information (ePHI).
Recently, an entity paid more than $5 million to the HHS Office for Civil Rights (OCR) over breach concerns of ePHI and violations of the HIPAA Security Rule. As you can imagine, many of the concerns were directly related to technical safeguards, or lack thereof.
How are you feeling about the ePHI that your organization is responsible for protecting? Do you know if you are meeting the requirements of everything in the HIPAA Security Rule? What is a compliance officer’s responsibility regarding technical safeguards?
Download our free eBrief, “HIPAA Security Rule Series Part 3: Technical Safeguards,” to make sure you’re covering all the bases so you can sleep better at night.
This eBrief covers:
- Everything included in the Security Rule’s technical safeguards
- How technical safeguards affect your risk assessments
- Detailed findings from the $5 million ePHI breach
- Access control and encryption information
In our other eBriefs on this series, we covered other essential elements of the HIPAA Security Rule. You can download those in the links below.