HIPAA Security and Laptop Theft
The following guest post is provided by Bob Chaput, President of Data Mountain LLC, a data security, disaster recovery and data protection services firm. HITECH…
Read MoreThe following guest post is provided by Bob Chaput, President of Data Mountain LLC, a data security, disaster recovery and data protection services firm. HITECH…
Read MoreHR 4851, the Continuing Extension Act of 2010 was signed into law in April. It extends unemployment benefits, delays Medicare reimbursement cuts for physicians, and…
The Centers for Medicare and Medicaid Services (CMS) issued a Notice of Proposed Rulemaking (NPRM) on December 30, 2009, outlining both the objectives and measures…
The Office of the National Coordinator (ONC) issued an Interim Final Rule (IFR) on December 30, 2009. The rules propose the initial set of standards,…
The official rules covering meaningful use were published in the Federal Registry on January 13. The two rules cover meaningful use of EHR as mandated…
The following guest post is provided by Alex Zaltsman, CEO of Experior Data Security and Encryption Analysis of Privacy & Security in Meaningful Use rule…