Search for: "PHI, INCORPORATED"
Results 41 - 60
of 116
Sorted by Relevance
|
Sort by Date
21 Nov 2023, 3:15 pm
OCR’s investigation indicated that SRMC failed to safeguard the patient’s PHI from impermissible disclosure by intentionally disclosing PHI to multiple media outlets on at least three separate occasions, without a valid written authorization. [read post]
6 Dec 2009, 9:17 pm
Other revisions are also recommended, including: Incorporating a timeframe by when business associates are required to notify covered entities of a breach (i.e., within 3 to 5 days of discovering the breach). [read post]
6 Dec 2009, 9:17 pm
Other revisions are also recommended, including: Incorporating a timeframe by when business associates are required to notify covered entities of a breach (i.e., within 3 to 5 days of discovering the breach). [read post]
9 Jun 2023, 12:34 pm
Most litigators have incorporated multiple forms of technology for case management, document review, trial presentation, and, of course, legal research. [read post]
11 Sep 2019, 7:22 am
If so, what are its responsibilities in the event of a breach of PHI? [read post]
2 Aug 2011, 8:49 am
The HIPAA Security Rule currently requires covered entities to monitor access to electronic PHI. [read post]
10 Sep 2013, 11:53 am
Employers should recall that earlier this year, HHS issued its final security and privacy regulations that made some real changes to the breach notification rules and the business associate rules and employers should make sure that thee change have been implemented to avoid penalties.With respect to the privacy rules, a revised Notice of Privacy Practices should be issued to incorporate the new rules related to breaches in the security of protected health information (PHI). [read post]
11 Sep 2015, 5:07 am
Is an incident response plan in place for responding to breaches of unsecured PHI? [read post]
20 Aug 2011, 9:30 am
" Simply asking whether the business associate complies with the Security Rule and incorporating mandatory compliance into a contract is not likely to be enough. [read post]
9 Nov 2023, 1:00 pm
Generally, you will also see the participating provider agreements incorporate compliance with state and federal laws, including the HITECH Act. [read post]
20 Aug 2011, 9:30 am
" Simply asking whether the business associate complies with the Security Rule and incorporating mandatory compliance into a contract is not likely to be enough. [read post]
29 Jun 2011, 7:46 am
The HIPAA Security Rule applies to electronic PHI held by covered entities and, since the amendments of the HITECH Act, business associates. [read post]
17 Feb 2010, 1:43 pm
(b) The media on which the PHI is stored or recorded have been destroyed in one of the following ways: (i) Paper, film, or other hard copy media have been shredded or destroyed such that the PHI cannot be read or otherwise cannot be reconstructed. [read post]
17 Feb 2010, 1:43 pm
(b) The media on which the PHI is stored or recorded have been destroyed in one of the following ways: (i) Paper, film, or other hard copy media have been shredded or destroyed such that the PHI cannot be read or otherwise cannot be reconstructed. [read post]
5 Nov 2020, 2:18 pm
The Information Blocking rule incorporates and cross-references many of the HIPAA Privacy Rules, including the rule giving individuals the right to access their PHI (45 C.F.R. 164.524). [read post]
5 Nov 2020, 2:18 pm
The Information Blocking rule incorporates and cross-references many of the HIPAA Privacy Rules, including the rule giving individuals the right to access their PHI (45 C.F.R. 164.524). [read post]
17 Jul 2014, 6:30 am
General Rules for Issuing a Denial There are several general rules one should follow and incorporate in their best practices. [read post]
23 Oct 2013, 2:44 pm
If the data contains personally identifiable information (PII), protected health information (PHI) or similar types of data covered by data privacy laws, the data most likely should remain onshore. [read post]
6 May 2009, 8:39 pm
These guidelines are something to consider in designing secure environments for data -- they address both data in use and data at rest, and incorporate by reference some NIST standards. [read post]
10 Jan 2023, 11:44 am
However, the breach notification requirements under HIPAA do currently apply to any Part 2 Records that are also considered PHI. [read post]