Remove Computer and Electronics Remove Encryption Remove Insurance Remove Risk
article thumbnail

Understanding HIPAA: A Guide to Avoiding Common Violations

Armstrong Archives

The Health Insurance Portability and Accountability Act (HIPAA) ensures individuals’ health data protection and privacy. This includes insurance companies, nurses, and doctors. Lack of Adequate Security Measures The HIPAA has a requirement that healthcare organizations take strong steps to protect electronic health information.

article thumbnail

First Multistate HIPAA Data Breach Lawsuit May Signal Increased State Interest in Data Security Enforcement

Data Matters

On December 3, 2018, twelve attorneys general (“AGs”) jointly filed a data breach lawsuit against Medical Informatics Engineering and its subsidiary, NoMoreClipboard LLC (collectively “the Company”), an electronic health records company, in federal district court in Indiana. See Indiana v. Informatics Eng’g, Inc. , 3:18-cv-00969 (N.D.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Podcast Episode 119: EFF on Expanding Researchers Rights and AT&T talks IoT Security Fails

The Security Ledger

In this episode of the podcast, #119: Electronic Frontier Foundation General Counsel Kurt Opsahl joins us to talk about the Coders’ Rights Project. In this episode of the podcast, #119: Electronic Frontier Foundation General Counsel Kurt Opsahl joins us to talk about the Coders’ Rights Project. Read the whole entry. »

IoT 40
article thumbnail

German DPAs Address a Wide Range of Topics at Annual Conference and Adopt Resolutions

Hunton Privacy

securing electronic communications by implementing and developing end-to-end encryption. The DPAs request to strengthen the rights of the private and intimate sphere of patients’ and insured patients’ lives. Resolution on End-to-End Encryption. The previous Conference was held in Bremerhaven in March 2013.

article thumbnail

Five Steps to HIPAA Security Compliance

HIPAA

The health insurance portability and accountability act has set various guidelines, which should be adhered to by anyone who handles any electronic medical data. These steps include: Run a complete risk assessment of the medical practice. A risk assessment against HIPAA guidelines exposes areas in which changes are needed.

article thumbnail

Five Steps to HIPAA Security Compliance

HIPAA

The health insurance portability and accountability act has set various guidelines, which should be adhered to by anyone who handles any electronic medical data. These steps include: Run a complete risk assessment of the medical practice. A risk assessment against HIPAA guidelines exposes areas in which changes are needed.

article thumbnail

Five Steps to HIPAA Security Compliance

HIPAA

The health insurance portability and accountability act has set various guidelines, which should be adhered to by anyone who handles any electronic medical data. These steps include: Run a complete risk assessment of the medical practice. A risk assessment against HIPAA guidelines exposes areas in which changes are needed.