Hospitals produced an estimated 697 million megabytes of data in 2015. That’s more than two megabytes of medical data for every man, woman and child in the United States. And while we may spend billions of dollars and more hours entering data than seeing patients, much of that data remains inaccessible, hidden behind proprietary data architectures, authorizations and patient matching problems.
Imagine you decide to go to the Emergency Department or even an acute care clinic right now. How far would you have to travel, what would you need to bring, what comforts would you leave behind for a harried, hurried trip to a waiting room? And just how much would this trip cost? On the other hand, how long would it take you to set up a FaceTime chat?
Have you been the victim of a breach? Maybe not, but perhaps you know someone who has. Either way, deciding what to do next can be challenging if you're unprepared. First, it's important to determine whether the incident is truly a breach or simply a false alarm, then follow these guidelines to quickly respond.
HIPAA compliance is required in order to avoid large fines from the federal government, but there is another issue you can address when you implement HIPAA compliance – strengthening your practice’s network security.
Thirty billion dollars. Stacked as $100 bills, that would tower well above the weather clouds. Thirty billion dollars grabs plenty of attention. Since 2011, the U.S. Government has spent just that on Electronic Health Record incentives. In 2014, there were over 400 EHR vendors scrambling for a piece of the pie. To put it in perspective, the top five EHR companies only control 48% of the market with scores of companies rounding the majority of market share.
Editor's note: This is the third blog in a series of articles on HIPAA compliance and is produced in partnership with Total HIPAA Compliance. The second blog in this series discussed HIPAA training for your staff and can be viewed here.
Increasingly, electronic health records have the potential to make care mobile. Pulling up PACS images, analyzing labs and vitals, even computerized physician order entry can routinely be done remotely. But this more streamlined, now routine, care is only the beginning. True EHR mobility encompasses both acute and chronic care decisions, inside the hospital and outside the hospital.
Editor's note: This is the second blog in a series of articles on HIPAA compliance and is produced in partnership with Total HIPAA Compliance. The first blog in this series discussed penetration testing and can be viewed here. In the next article, we'll take a look at why staff may be your biggest threat to compliance.
You come in to work on Monday, log into your practice’s network, and there is a message that a hacker now controls your EHR and wants a ransom to allow you access. How could you have prevented this invasion? One way is by conducting a penetration test. This is a great tool to help determine your vulnerabilities and correct security holes in your network before a hacker can find them.
With the new year in full swing, the Office of Civil Rights (OCR) is set to begin Phase 2 of its HIPAA audits program, targeting specific areas of noncompliance in healthcare organizations and among business associates who come in direct contact with protected health information.