Remove Analysis Remove Computer and Electronics Remove Encryption Remove Risk
article thumbnail

HHS Releases Guidance on Audio-Only Telehealth Practices

Hunton Privacy

If a covered entity uses a standard telephone line ( i.e. , a landline), the HIPAA Security Rule will not apply because the PHI transmitted is not electronic in nature. Covered entities should identify, assess and address any risks and vulnerabilities posed by such technologies as part of its required risk analysis and management process.

article thumbnail

Application Security: Complete Definition, Types & Solutions

eSecurity Planet

By gaining a deeper understanding of application security, companies can take the necessary steps and actions to safeguard their valuable assets and reduce the risk of devastating data breaches. The security measures that AppSec requires depends on the type of application and risks involved. How Does Application Security Work?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

First Multistate HIPAA Data Breach Lawsuit May Signal Increased State Interest in Data Security Enforcement

Data Matters

On December 3, 2018, twelve attorneys general (“AGs”) jointly filed a data breach lawsuit against Medical Informatics Engineering and its subsidiary, NoMoreClipboard LLC (collectively “the Company”), an electronic health records company, in federal district court in Indiana. See Indiana v. Informatics Eng’g, Inc. , 3:18-cv-00969 (N.D.

article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

BK: But certainly there are some areas of computer hardware and network design where you absolutely must have far greater integrity assurance? TS: The government still has regular meetings on supply chain risk management, but there are no easy answers to this problem. The attacker in this case has a risk model, too.

Security 203
article thumbnail

Hong Kong Regulator Imposes New Conditions to Regulate Outsourcing Arrangements for Cloud Storage

Data Matters

identical electronic records at both its approved premises and the EDSP (whether located in Hong Kong or elsewhere). identical electronic records at both its approved premises and the EDSP (whether located in Hong Kong or elsewhere). by encryption). by encryption). Whom does this affect? How does it affect you? .

Cloud 68
article thumbnail

HHS Announces Settlements with Health Care System and Medical Research Institute over Potential HIPAA Violations

Hunton Privacy

In announcing the settlement with North Memorial, OCR Director Jocelyn Samuels noted that North Memorial had overlooked “[t]wo major cornerstones of the HIPAA Rules” by failing to enter into compliant BAAs and conducting a risk analysis. failed to encrypt ePHI or implement an equivalent mechanism. Feinstein Institute.

article thumbnail

HHS Settles First HIPAA Enforcement Action Against a State Agency

Hunton Privacy

The settlement relates to the theft of a portable electronic storage device potentially containing electronic protected health information (“ePHI”) from the car of a DHSS computer technician in October 2009. Pursuant to the resolution agreement, DHSS has agreed to pay $1.7 million to HHS to settle the potential violations.