(713) 621-6000
Contact us today!

AltexIT Blog

Altex Business Solutions has been serving the Houston area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What is HIPAA and Why it is important

What is HIPAA and Why it is important

What is HIPAA?
HIPAA (the Health Insurance Portability and Accountability Act) refers to a series of federal laws and implementation regulations enacted beginning in 1996 to protect the privacy and security of patient information – i.e. medical records.

Patient information extends beyond purely clinical information and also includes demographic and financial information related to a patient. Although the right of a patient to have their medical records kept private and secure was firmly established over 15 years ago, the breach or improper disclosure of this information occurs on an almost daily basis. The consequences of an improper medical data disclosure can be very severe for both the affected individual and the organization responsible for causing it. A patient can be subject to identity theft, tax return fraud, medical care procured in their name, and damage to their credit rating – and they can’t cancel their medical record like they can a stolen credit card, so the problem persists. The entity which causes the breach will be subject to considerable expense to report it and repair the damage, reputational damage as well as government fines, all of which may threaten their continued existence as a business. Knowing all of this, why would an organization not want to make every reasonable effort to keep valuable information private and secure? The good news is, doing this need not be as difficult, time consuming and expensive as many think. We will tell you how to become properly HIPAA compliant in future communications.

If you have questions about HIPAA or would like a complimentary HIPAA Compliance Review for your organization, please contact us inform@altexsolutions.com.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 21 May 2018
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *
    • Please enter the following code in the field below:*

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Cloud Best Practices Privacy Hackers MediTouch Backup Business Computing Hosted Solutions Microsoft Google Productivity Business Malware Network Security Internet Medisoft Email Disaster Recovery Business Continuity Efficiency Mobile Devices Managed IT Services HIPAA Software VoiP MACRA IT Services IT Support Innovation Windows 10 Data Android Miscellaneous Server MIPS Workplace Tips Medisoft 21 Browser Hardware Security Risk Assessment Communication communications Computer Cybercrime Upgrade Managed Service Provider Windows Data Backup Smartphone Mobile Device Management Outsourced IT User Tips Network Computers ransomware Ransomware Virtualization Holiday Saving Money Hacking Alert Office Marketing Chrome Smartphones Data Recovery Cloud Computing Social Media Business Management Save Money BDR Mobile Computing Small Business BYOD Electronic Health Records Social Engineering Quick Tips Microsoft Office Automation Employer-Employee Relationship Internet of Things Collaboration Recovery Operating System Remote Monitoring IT Solutions Mobility Remote Computing Health Cybersecurity MACRA/MIPS VPN Information Technology Application Telephone Systems Avoiding Downtime Budget App Managed IT Office Tips Flexibility Managed IT Services Bring Your Own Device WiFi Passwords Big Data Bandwidth How To Two-factor Authentication Law Enforcement Spam Phishing EMR in the Cloud Gadgets Electronic Medical Records User Error Private Cloud Business Intelligence Office 365 Money Data Protection Data Breach Apple HIPAA Security EHR Tech Term EHR in the Cloud Data Management The Internet of Things Compliance Gmail Artificial Intelligence Data Security Redundancy PQRS Phone System Unified Threat Management Identity Theft Mouse History Administration Proactive IT Firewall Save Time Website Vulnerability Work/Life Balance Wi-Fi Wireless Technology Facebook Retail Vendor Management HaaS Apps Value iPhone Mobile Office Mobile Device Going Green Windows 10 Google Drive Applications Lithium-ion battery HIPAA Compliant Search Password Black Market Networking Medisoft 17 Internet Exlporer Human Resources Network Congestion Hard Drives DDoS Humor Document Management Best Practice Antivirus Credit Cards Downtime Colocation Data Storage Meetings Data storage Computing Infrastructure Worker Commute Environment SaaS Infrastructure IT Support Word Robot Productivity Entertainment Router Excel Risk Management Virtual Reality Outlook End of Support Comparison IT Management Legal Hacker Wireless Content Filtering Workers IT Plan Training PowerPoint Physical Security Unsupported Software IT Consultant Solid State Drive eWaste Streaming Media OneNote Public Cloud Touch Type Talk Cleaning Smart Tech Settings Safety Instant Messaging Encryption CES Update Memory Fax Server Analytics CMS Government Biometrics Data loss PDF Shadow IT Business Owner Spam Blocking Frequently Asked Questions physician – Maintenance Addiction Theft Mobile Techology How to Files Staff Consultant Multi-Factor Security Hosted Computing lytec Cast Lytec Tip of the week home Altex HIPAA Shortcut Sports People Distributed Denial of Service Cortana webinar Professional Services Windows 10s Automobile Social Digital Signature Best Available Trending Inventory Productiity Patch Management Charger Windows Server 2008 time Physician burnout isn ’t fun Keyboard Big Deal Fraud Analyitcs Google Apps Conferencing Tools healthcare regulations Meaningful Use Social Networking Strategy Lifestyle Access Control Scam Windows Media Player Computer Care Windows 7 patients YouTube Amazon Ransomware' Audit Monitor Advancing Care Information Value Based Modify Analysis User Authentication Data Warehousing Samsung Regulations Medisoft Upgrade NarrowBand Disaster Amazon Web Services IaaS Password Manager Botnet Computer Fan Reputation Top Medical Billing Software Systems Billing Virtual Desktop Claims Accountants Bluetooth Nanotechnology Online Shopping EHR Incentive Servers 2015 Quality Payment Program Chromecast Bloatware Business Mangement Travel FENG Customers Electronic Medical Records EMR Internet exploMicrosoft HealthFusion ’s MediTouch software Automated USB Specifications Connectivity Evernote Medisoft V21 Flash Laptop Science SharePoint Battery Entrepreneur Recycling WIndows 7 Lytec 2017 Advertising Customer Relationship Management Uninterrupted Power Supply IoT Millennials Devices Wireless Charging Sync Touchpad Education Cost Management Criminal Managing Stress Emails Software as a Service Appointment reminders PQRS Eligible Professionals Software Tips Customer Service Online Currency Workforce Thought Leadership Windows 8 Wearable Technology Fiber-Optic Virus Current Events Telephony ICD -10 code Video Games Relocation Twitter Netflix Electronic Statements Root Cause Analysis 2017 MACRA Hybrid Cloud Tech Support IT service Telecommuting Content Filter Tablet Running Cable Cables Knowledge Skype October 1 Scalability Users Notifications Content Management Google Docs Insurance Online payments MediTouch' HBO Domains Remote Work Storage Tablets Unified Communications Leadership Start Menu codes Programming Blockchain Voice over Internet Protocol Practices BillFlash Screen Mirroring

      Top Blog

        It was a routine morning in the office that day, recalls Dr. Lanter. He saw patients, the weather wasn’t bad. People in Rockaway were surfing before the storm, which is typical. “I figured it was going to rain, it was going to blow, but it was not going to be that bad. Big storms had come an...
      QR-Code