Slide 1
Your Trusted IT Support Partner Since 2003

We deliver reliable and affordable IT solutions for the Small Business Community.

RSS feed for this section

PHI

Ten examples of inadequate access controls to protect ePHI

Ten Examples of Inadequate Access Controls to Protect ePHI Access controls that are insufficient can endanger protected health information (PHI) and cause organizations to break the Health Insurance Portability and Accountability Act (HIPAA) Security Rule. Inadequate access controls can also lead to inadequate incident response plans which can cause HIPAA violations. Ten instances of poor …

Ten examples of inadequate access controls to protect ePHI Continue Reading ->

Ten examples of inadequate access controls to protect ePHI

Ten Examples of Inadequate Access Controls to Protect ePHI Access controls that are insufficient can endanger protected health information (PHI) and cause organizations to break the Health Insurance Portability and Accountability Act (HIPAA) Security Rule. Inadequate access controls can also lead to inadequate incident response plans which can cause HIPAA violations. Ten instances of poor

Ten examples of how lack of encryption can cause a data breach

Ten examples of how lack of encryption can cause a data breach Lack of encryption on various devices and in different situations can put electronic protected health information (ePHI) at risk of a data breach. Here are ten examples: Unencrypted laptops: Storing ePHI on unencrypted laptops can lead to unauthorized access if the laptop is

Ten examples of how lack of encryption can cause a data breach

Ten examples of how lack of encryption can cause a data breach Lack of encryption on various devices and in different situations can put electronic protected health information (ePHI) at risk of a data breach. Here are ten examples: Unencrypted laptops: Storing ePHI on unencrypted laptops can lead to unauthorized access if the laptop is

Who should perform a SRA and how often?

Who should perform a SRA and how often? Small medical practices and all other covered businesses must perform Security Risk Assessments (SRAs) regularly in accordance with the Health Insurance Portability and Accountability Act (HIPAA)’s Security Rule. SRAs should be carried out at least yearly or whenever there are major changes to the organization’s systems, procedures,

Who should perform a SRA and how often?

Who should perform a SRA and how often? Small medical practices and all other covered businesses must perform Security Risk Assessments (SRAs) regularly in accordance with the Health Insurance Portability and Accountability Act (HIPAA)’s Security Rule. SRAs should be carried out at least yearly or whenever there are major changes to the organization’s systems, procedures,

Call DP Tech Group for your business IT needs. 630-372-0100

Give us a call or fill out our contact form for a quote.

Scroll to Top