(914) 595-2250        

Jeremie Scheiner

EZ MSP has been serving the Yonkers area since 2008, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alaskan Healthcare Organization Hit with Huge Fine for HIPAA Violation

b2ap3_thumbnail_fines_imposed_for_hipaa_400.jpgAmerican healthcare organizations must store and exchange patient data in ways that comply with the HIPAA law, or else face hefty fines. One mental health service in Alaska recently learned this lesson the hard way after being hit with a $150,000 fine. Is your healthcare organization’s IT infrastructure 100 percent HIPAA compliant?

Last December, the Office for Civil Rights (OCR) found Anchorage Community Mental Health Services (ACMHS) guilty of a breach of OCR’s electronic protected health information (ePHI) that affected more than 2,700 patient records.

As reported by The National Law Review, this whole fiasco could have easily been prevented if ACMHS stayed on top of their basic IT maintenances: “The OCR determined that the incident was the direct result of ACMHS’ failure to identify and address basic risks such as running outdated and unsupported software, and failure to regularly update software patches.” In addition to ACMHS being fined a cool $150k, they agreed to adopt a corrective action plan set by OCR.

The last thing your healthcare organization needs is to get slammed with a major fine like this. Additionally, having to take actions to rebuild trust with your patients may be more costly to your organization than a fine. To help your healthcare organization remain HIPAA compliant, be sure to implement these four HIPAA guidelines provided by The National Law Review:

  • The Security Rule, which relates to electronic PHI, continues to be a focus of the OCR;
  • A basic requirement of the Security Rule is that Covered Entities and Business Associates should regularly conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the security of electronic PHI;
  • Covered Entities and Business Associates should remain current on software and software patches to help avoid malware and other hacking incidents; and
  • HIPAA policies and procedures should be meaningful to your organization and should be regularly used, reviewed, and revised as necessary.

For security reasons like a breach experienced by ACMHS, it’s risky for any business to use unsupported software (like the infamous and no-longer-supported Windows XP), or to skip out on installing security patches. However, when it comes IT maintenances like these, a non-healthcare business has the option to roll the dice and risk not doing them. Due to the stricter-than-normal demands of HIPAA regarding the maintenance of IT systems, your healthcare organization doesn’t have the luxury of not updating your information technology.

Ultimately, these extra protections afforded by HIPAA are a good thing because they better protect patient information. Your healthcare organization having to jump through extra hoops may seem like an unneeded pain at times, but with a knowledgeable IT provider like EZ MSP overseeing your organization’s IT infrastructure, you can rest assured that your practice is HIPAA compliant. If you’re all squared away with HIPAA, then you can focus your time and energy on more important things than updating software and installing security patches, like taking care of your patient's health!

To make sure that your healthcare organization’s IT infrastructure is HIPAA compliant, give EZ MSP a call at (914) 595-2250.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 19 August 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Internet Business Computing Hackers Best Practices Hosted Solutions Backup Productivity Business IT Services Microsoft Malware Software IT Support Hardware Business Continuity Efficiency Google Windows Miscellaneous Mobile Device Management Disaster Recovery Innovation Workplace Tips Managed Service Provider Computer VOIP Data Save Money Server Network Email User Tips Windows 10 Mobile Computing Network Security Smartphone Virtualization Business Management communications Android Upgrade Social Media Mobile Devices BYOD Operating System Information Technology Chrome Firewall Communication Outsourced IT IT Solutions Holiday Office Employer-Employee Relationship Remote Computing Avoiding Downtime Saving Money Hosted Solution Spam Managed IT Services The Internet of Things Quick Tips Health Going Green Budget Computers Best Practice Small Business Hacking Microsoft Office Managed IT Remote Monitoring Alert Recovery Browser Telephone Systems WiFi Saving Time Application Gmail BDR Phone System Automation Unified Threat Management Collaboration User Error Wireless Technology Cybercrime Gadgets Bandwidth Big Data VPN Tablet Facebook Apps Social Streaming Media Outlook Cost Management Business Intelligence Compliance Marketing Audit Administration Data Management Password Content Filtering Unsupported Software Intranet Phishing Government Social Engineering Lithium-ion battery Maintenance Hard Drives Passwords Disaster Printer Apple Smartphones Risk Management Mobility Mobile Office Analytics Proactive IT Net Neutrality Search Printer Server Meetings App Ransomware Biometrics Bring Your Own Device Education Network Congestion Laptop Humor Retail Value OneNote Cloud Computing DDoS Two-factor Authentication Emails Antivirus Telephony Robot iPhone Excel Fax Server Productivity Private Cloud Office Tips Data Storage Google Drive Solid State Drive Applications Router History PowerPoint Customer Service Shortcut Data Backup Internet of Things HIPAA Tech Support Office 365 IT solutions Trending Instant Messaging Chromecast Human Resources Augmented Reality Data Protection Reputation Cybersecurity Online Currency Computer Accessories Best Available Bloatware Document Management Windows 10s Update Wearable Technology Administrator Settings Inbound Marketing IT Management Colocation Programming Computer Care Running Cable Mouse Save Time Hard Disk Drive IT Support Access Benefits Vendor Management Near Field Communication Twitter WIndows Server 2008 Hacker Safety Windows 10 Commerce Transportation Branding IT Consultant Patch Management Relocation Storage Emergency Vulnerability Data Recovery IT consulting Paperless Office Regulation Money OneDrive Upgrades Distributed Denial of Service Customer Relationship Management Support iOS Managed IT Service Data storage IT service Reliable Computing Sync Consultant eWaste Science Entertainment Computer Fan Internet Exlporer Domains Touchscreen Television Virtual Desktop Dark Web Uninterrupted Power Supply Screen Mirroring USB Managed IT Services SaaS Regulations Cast Touchpad ISP Bluetooth Encryption WIndows 7 Travel Avoid Downtime Data Breach HaaS Virtual Reality Buisness Cameras Nanotechnology Sports Busines Management Data Security Current Events SharePoint Managing Stress Users Webinar IT Technicians Networking Presentation Root Cause Analysis Files HBO Law Enforcement Point of Sale Teamwork User

Mobile? Grab this Article!


Recent Comments

Will Takera Tip of the Week: Mirroring Your Android’s Screen, Made Easy
16 August 2017
Actually, Chromecast can also help with an Android phone mirroring. Referring to a YouTube video, I ...

Blog Archive