Search for: "PHI, INCORPORATED" Results 41 - 60 of 116
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
21 Nov 2023, 3:15 pm by Cynthia Marcotte Stamer
  OCR’s investigation indicated that SRMC failed to safeguard the patient’s PHI from impermissible disclosure by intentionally disclosing PHI to multiple media outlets on at least three separate occasions, without a valid written authorization. [read post]
6 Dec 2009, 9:17 pm by Jason Greis
Other revisions are also recommended, including: Incorporating a timeframe by when business associates are required to notify covered entities of a breach (i.e., within 3 to 5 days of discovering the breach). [read post]
6 Dec 2009, 9:17 pm by Jason Greis
Other revisions are also recommended, including: Incorporating a timeframe by when business associates are required to notify covered entities of a breach (i.e., within 3 to 5 days of discovering the breach). [read post]
9 Jun 2023, 12:34 pm by Joshua Lloyd
Most litigators have incorporated multiple forms of technology for case management, document review, trial presentation, and, of course, legal research. [read post]
11 Sep 2019, 7:22 am by Paulette Thomas
If so, what are its responsibilities in the event of a breach of PHI? [read post]
2 Aug 2011, 8:49 am by Harley Geiger
The HIPAA Security Rule currently requires covered entities to monitor access to electronic PHI. [read post]
10 Sep 2013, 11:53 am by William Maruca
Employers should recall that earlier this year, HHS issued its final security and privacy regulations that made some real changes to the breach notification rules and the business associate rules and employers should make sure that thee change have been implemented to avoid penalties.With respect to the privacy rules, a revised Notice of Privacy Practices should be issued to incorporate the new rules related to breaches in the security of protected health information (PHI). [read post]
20 Aug 2011, 9:30 am by Carlos Leyva
" Simply asking whether the business associate complies with the Security Rule and incorporating mandatory compliance into a contract is not likely to be enough. [read post]
9 Nov 2023, 1:00 pm by Caitlin Lentz
  Generally, you will also see the participating provider agreements incorporate compliance with state and federal laws, including the HITECH Act. [read post]
20 Aug 2011, 9:30 am by Carlos Leyva
" Simply asking whether the business associate complies with the Security Rule and incorporating mandatory compliance into a contract is not likely to be enough. [read post]
29 Jun 2011, 7:46 am by admin
The HIPAA Security Rule applies to electronic PHI held by covered entities and, since the amendments of the HITECH Act, business associates. [read post]
17 Feb 2010, 1:43 pm by Carlos Leyva
(b) The media on which the PHI is stored or recorded have been destroyed in one of the following ways: (i) Paper, film, or other hard copy media have been shredded or destroyed such that the PHI cannot be read or otherwise cannot be reconstructed. [read post]
17 Feb 2010, 1:43 pm by Carlos Leyva
(b) The media on which the PHI is stored or recorded have been destroyed in one of the following ways: (i) Paper, film, or other hard copy media have been shredded or destroyed such that the PHI cannot be read or otherwise cannot be reconstructed. [read post]
5 Nov 2020, 2:18 pm by Elizabeth G. Litten
The Information Blocking rule incorporates and cross-references many of the HIPAA Privacy Rules, including the rule giving individuals the right to access their PHI (45 C.F.R. 164.524). [read post]
5 Nov 2020, 2:18 pm by Elizabeth G. Litten
The Information Blocking rule incorporates and cross-references many of the HIPAA Privacy Rules, including the rule giving individuals the right to access their PHI (45 C.F.R. 164.524). [read post]
17 Jul 2014, 6:30 am by Michael B. Stack
  General Rules for Issuing a Denial   There are several general rules one should follow and incorporate in their best practices. [read post]
23 Oct 2013, 2:44 pm
If the data contains personally identifiable information (PII), protected health information (PHI) or similar types of data covered by data privacy laws, the data most likely should remain onshore. [read post]
6 May 2009, 8:39 pm
  These guidelines are something to consider in designing secure environments for data -- they address both data in use and data at rest, and incorporate by reference some NIST standards. [read post]
However, the breach notification requirements under HIPAA do currently apply to any Part 2 Records that are also considered PHI. [read post]