Deidentified Information and Protected Health Information
Why Should You Care about Deidentified Information? Ron Sterling Sterling Solutions Author: Keys to EMR/EHR Success According to the HIPAA Security and Privacy standard, your…
Read MoreWhy Should You Care about Deidentified Information? Ron Sterling Sterling Solutions Author: Keys to EMR/EHR Success According to the HIPAA Security and Privacy standard, your…
Read MoreReviewing Your HIPAA Security and Privacy Exposure Ron Sterling Sterling Solutions Author: Keys to EMR/EHR Success With the focus on Meaningful Use Measures, many practices…
What does the Jefferson Memorial have in common with Privacy and Security in the Age of Meaningful Use? David Finn, Health IT Officer at Symantec LinkedIn…
Meaningful Use Attestation for Security Risk Analysis One of the meaningful use core objectives for Eligible Professionals and Eligible Hospitals is to protect electronic health…
CMS Delays HIPAA 5010 Transaction Standards CMS has announced a delay in the enforcement for updated HIPAA transaction standards ASC X12 Ver 5010 and NCPDP…
ONC and HHS Privacy and Security Mobile Device Project The current Federal Health Information Technology Strategic Plan outlines the nation’s strategy for the health IT…
HITECH Act Mandates Audits to Determine HIPAA compliance By William O’Toole O’Toole Law Group HIPAA privacy and security audits are not looming out there on…
A Year of Meaningful Use As we close out 2011 with a look back at the topics we covered through our HITECH Answers news and…
Top 10 Lists for Health IT It is that time of the year again when we look back and sort out the good and bad,…