HIPAA

Don’t Skimp on Training: Know Patient Rights

By Matt Fisher – What is the response when an individual submits a request to receive access to their medical record? The response can often be one of frustration over the time and effort that will go into compiling the record in response to the request.



Smile! Privacy Policy Snapshot – Model Privacy Notice

By David Harlow – In thinking about patient privacy, many folks assume that HIPAA is the first and last word on the subject. Nothing could be farther from the truth. Protected health information under HIPAA (PHI) is also protected by a variety of other federal and state regulatory schemes.


Why is Risk Management Such a Challenge?

By Clyde Hewitt – If one lesson is clear from the constant stream of recent settlements announced by the Office for Civil Rights, it is that covered entities are not implementing risk management plans to reduce risks to protected health information (PHI) to an acceptable and appropriate level.



Man-in-the-Middle Attacks

By John Nye – The US Department of Health and Human Services, OCR, published an advisory in the March issue of its “Cybersecurity Newsletter” warning of a well-known attack method known as the man-in-the-middle (MitM) attack.