(713) 621-6000
Contact us today!

AltexIT Blog

Altex Business Solutions has been serving the Houston area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What is HIPAA and Why it is important

What is HIPAA and Why it is important

What is HIPAA?
HIPAA (the Health Insurance Portability and Accountability Act) refers to a series of federal laws and implementation regulations enacted beginning in 1996 to protect the privacy and security of patient information – i.e. medical records.

Patient information extends beyond purely clinical information and also includes demographic and financial information related to a patient. Although the right of a patient to have their medical records kept private and secure was firmly established over 15 years ago, the breach or improper disclosure of this information occurs on an almost daily basis. The consequences of an improper medical data disclosure can be very severe for both the affected individual and the organization responsible for causing it. A patient can be subject to identity theft, tax return fraud, medical care procured in their name, and damage to their credit rating – and they can’t cancel their medical record like they can a stolen credit card, so the problem persists. The entity which causes the breach will be subject to considerable expense to report it and repair the damage, reputational damage as well as government fines, all of which may threaten their continued existence as a business. Knowing all of this, why would an organization not want to make every reasonable effort to keep valuable information private and secure? The good news is, doing this need not be as difficult, time consuming and expensive as many think. We will tell you how to become properly HIPAA compliant in future communications.

If you have questions about HIPAA or would like a complimentary HIPAA Compliance Review for your organization, please contact us inform@altexsolutions.com.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 23 July 2018
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *
    • Please enter the following code in the field below:*

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Privacy Hackers MediTouch Backup Business Computing Hosted Solutions Malware Microsoft Productivity Google Business Network Security Internet Medisoft Email Efficiency Mobile Devices Disaster Recovery Managed IT Services VoiP Business Continuity HIPAA Innovation Software IT Support Data IT Services MACRA Miscellaneous Windows 10 Android Workplace Tips Hardware Server communications MIPS Data Backup Outsourced IT Browser Computer Medisoft 21 Upgrade Managed Service Provider Windows User Tips Communication Security Risk Assessment Network Cybercrime Smartphone Mobile Device Management Data Recovery Computers ransomware Virtualization Ransomware Cloud Computing Alert Office Save Money Holiday BDR Saving Money Hacking Social Media Electronic Health Records Tech Term Microsoft Office Business Management Marketing Chrome Smartphones Internet of Things Cybersecurity Social Engineering Quick Tips Automation Employer-Employee Relationship Mobile Computing Small Business BYOD MACRA/MIPS Application Collaboration Recovery Telephone Systems Remote Monitoring Operating System Mobility IT Solutions Remote Computing Health Information Technology VPN Passwords Big Data Bandwidth Two-factor Authentication How To Artificial Intelligence Spam Avoiding Downtime Budget Gadgets App Law Enforcement Managed IT Office Tips Flexibility Managed IT Services Bring Your Own Device Office 365 HIPAA Security Money WiFi Data Management Gmail Applications Networking PQRS Redundancy Data Security Phishing EMR in the Cloud Password Electronic Medical Records User Error Website Apple Private Cloud Data Breach Facebook Business Intelligence Router Data Protection The Internet of Things EHR in the Cloud Compliance EHR HaaS Lithium-ion battery Windows 10 Connectivity Google Drive Search HIPAA Compliant Phone System Unified Threat Management Mouse Black Market Document Management History Administration Blockchain Save Time Identity Theft Work/Life Balance IT Support Entertainment Proactive IT Firewall Wireless Technology Retail Vulnerability Wi-Fi Vendor Management iPhone Value Word Going Green Mobile Office Apps Mobile Device Comparison IT Management Servers Education Touch Type Talk Paperless Office Instant Messaging IT Plan Physical Security Memory Fax Server Solid State Drive Analytics eWaste Streaming Media Biometrics Unsupported Software Public Cloud Cleaning Settings OneNote Safety Encryption Smart Tech Human Resources CES Update Hard Drives Spam Blocking Humor CMS Business Owner Government Medisoft 17 PDF Antivirus Shadow IT Content Management Data loss Internet Exlporer Network Congestion DDoS Worker Commute Best Practice Sports Environment Downtime Colocation Credit Cards Robot Excel Meetings Virtual Reality Data Storage Outlook Productivity Data storage Computing Infrastructure Hacker YouTube SaaS Content Filtering Legal Training Windows 7 USB PowerPoint Workers Access Control Risk Management Infrastructure Analysis End of Support IT Consultant Wireless Smart Office Accountants Cost Management Managing Stress Customers Online Currency Internet exploMicrosoft File Sharing Automated Online Shopping Customer Service Travel Windows 8 Emails FENG Virus Appointment reminders Laptop Nanotechnology SharePoint Business Mangement Specifications Twitter PQRS Eligible Professionals Current Events Advertising ICD -10 code Business Technology Uninterrupted Power Supply Video Games Evernote Flash Recycling Tablet Netflix Electronic Statements Touchpad Students IoT Millennials 2017 MACRA Sync Knowledge October 1 Virtual Assistant Scalability Wireless Charging Wearable Technology Criminal Software as a Service Tablets Online payments Users Devices Relocation Healthcare Workforce Programming Software Tips MediTouch' Telephony Leadership Hybrid Cloud codes Telephone System Tech Support IT service Fiber-Optic Maintenance Thought Leadership Running Cable Root Cause Analysis BillFlash Machine Learning Notifications Telecommuting Consultant Skype How to Domains Cables Shortcut Content Filter Google Docs lytec Productiity Altex HIPAA HVAC Remote Work Social HBO Best Available Lytec Start Menu Big Deal webinar physician – Insurance Unified Communications Storage Voice over Internet Protocol Analyitcs Screen Mirroring Techology Patch Management Automobile Files Keyboard Enterprise Content Management Social Networking Frequently Asked Questions Charger Mobile Conferencing Windows Media Player home healthcare regulations Meaningful Use Practices People Theft Addiction Distributed Denial of Service Staff Multi-Factor Security Cast Scam Password Management Tip of the week User Computer Care Professional Services Windows 10s time Physician burnout isn ’t fun Disaster Ransomware' Advancing Care Information Hosted Computing Cortana Cache Digital Signature Trending Value Based Modify Medisoft Upgrade NIST Fraud Virtual Desktop Windows Server 2008 Bluetooth Samsung Tools patients Inventory Google Apps Wireless Internet Strategy Lifestyle Bloatware Monitor Top Medical Billing Software Systems Billing EHR Incentive 2015 Quality Payment Program Cryptocurrency Amazon Science Audit NarrowBand HealthFusion ’s MediTouch software Wire IaaS Entrepreneur Data Warehousing WIndows 7 Electronic Medical Records EMR Reputation Medisoft V21 Safe Mode Claims Amazon Web Services Customer Relationship Management Regulations Botnet Computer Fan Lytec 2017 Chromecast Battery Authentication Password Manager

      Top Blog

        It was a routine morning in the office that day, recalls Dr. Lanter. He saw patients, the weather wasn’t bad. People in Rockaway were surfing before the storm, which is typical. “I figured it was going to rain, it was going to blow, but it was not going to be that bad. Big storms had come an...