Remote Support

(914) 595-2250      

Jeremie Scheiner

EZ MSP has been serving the Yonkers area since 2008, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alaskan Healthcare Organization Hit with Huge Fine for HIPAA Violation

b2ap3_thumbnail_fines_imposed_for_hipaa_400.jpgAmerican healthcare organizations must store and exchange patient data in ways that comply with the HIPAA law, or else face hefty fines. One mental health service in Alaska recently learned this lesson the hard way after being hit with a $150,000 fine. Is your healthcare organization’s IT infrastructure 100 percent HIPAA compliant?

Last December, the Office for Civil Rights (OCR) found Anchorage Community Mental Health Services (ACMHS) guilty of a breach of OCR’s electronic protected health information (ePHI) that affected more than 2,700 patient records.

As reported by The National Law Review, this whole fiasco could have easily been prevented if ACMHS stayed on top of their basic IT maintenances: “The OCR determined that the incident was the direct result of ACMHS’ failure to identify and address basic risks such as running outdated and unsupported software, and failure to regularly update software patches.” In addition to ACMHS being fined a cool $150k, they agreed to adopt a corrective action plan set by OCR.

The last thing your healthcare organization needs is to get slammed with a major fine like this. Additionally, having to take actions to rebuild trust with your patients may be more costly to your organization than a fine. To help your healthcare organization remain HIPAA compliant, be sure to implement these four HIPAA guidelines provided by The National Law Review:

  • The Security Rule, which relates to electronic PHI, continues to be a focus of the OCR;
  • A basic requirement of the Security Rule is that Covered Entities and Business Associates should regularly conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the security of electronic PHI;
  • Covered Entities and Business Associates should remain current on software and software patches to help avoid malware and other hacking incidents; and
  • HIPAA policies and procedures should be meaningful to your organization and should be regularly used, reviewed, and revised as necessary.

For security reasons like a breach experienced by ACMHS, it’s risky for any business to use unsupported software (like the infamous and no-longer-supported Windows XP), or to skip out on installing security patches. However, when it comes IT maintenances like these, a non-healthcare business has the option to roll the dice and risk not doing them. Due to the stricter-than-normal demands of HIPAA regarding the maintenance of IT systems, your healthcare organization doesn’t have the luxury of not updating your information technology.

Ultimately, these extra protections afforded by HIPAA are a good thing because they better protect patient information. Your healthcare organization having to jump through extra hoops may seem like an unneeded pain at times, but with a knowledgeable IT provider like EZ MSP overseeing your organization’s IT infrastructure, you can rest assured that your practice is HIPAA compliant. If you’re all squared away with HIPAA, then you can focus your time and energy on more important things than updating software and installing security patches, like taking care of your patient's health!

To make sure that your healthcare organization’s IT infrastructure is HIPAA compliant, give EZ MSP a call at (914) 595-2250.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 24 October 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Tip of the Week Technology Cloud Internet Privacy Best Practices Hackers Business Computing Network Security Hosted Solutions Malware Productivity Business Backup Microsoft Software IT Services Efficiency Google IT Support Hardware VOIP Business Continuity Email Business Management Mobile Device Management Mobile Devices Computer User Tips communications Windows Data Disaster Recovery Managed Service Provider Innovation Workplace Tips Network Server Outsourced IT Data Backup Managed IT Services Miscellaneous Tech Term Browser Save Money Smartphone Data Recovery Upgrade Internet of Things Small Business Virtualization Productivity Android Mobile Computing Cybersecurity Windows 10 Communication Holiday Collaboration Social Media Operating System Cybercrime Spam Phishing Chrome Microsoft Office Employer-Employee Relationship Smartphones Apps Best Practice Saving Money BYOD Managed IT BDR Office Firewall Information Technology The Internet of Things Budget Remote Computing IT Support IT Solutions Avoiding Downtime Quick Tips Health Telephone Systems Hosted Solution Automation Going Green User Error Data Security Computers Remote Monitoring Alert Hacking Windows 10 Application Passwords Ransomware Gadgets Recovery WiFi Gmail Saving Time VPN Two-factor Authentication Office 365 Wireless Technology Bandwidth Big Data Router Cloud Computing Cost Management Streaming Media Compliance Audit Marketing Bring Your Own Device Phone System Content Filtering Managed IT Services Unified Threat Management Government Data Breach Antivirus Money Data Management Apple Tech Support Proactive IT Applications Risk Management Social Engineering Mobility Tablet Intranet Vulnerability Maintenance Law Enforcement Facebook Hard Drives Social Business Intelligence Update Outlook Password Administration Printer Project Management PowerPoint Education Retail Value OneNote Excel Blockchain Disaster History Google Drive App SaaS Data Protection Unsupported Software Shortcut Mobile Office Travel Information Analytics Lithium-ion battery Networking Users iPhone Fax Server Safety Meetings Search Politics Printer Server Managed Service Biometrics Touchscreen Software as a Service Conferencing Network Congestion Data Storage Data Loss MSP Storage DDoS Humor Telephony Management Robot Google Docs Redundancy Emails Private Cloud Encryption Business Technology Mobile Security eWaste Office Tips Solid State Drive Google Assistant Net Neutrality Augmented Reality Cortana Customer Service Artificial Intelligence Devices Wireless Charging Vendor Management Laptop Sports HIPAA Mobile Device Fraud Commerce Wi-Fi Instant Messaging Patch Management User Chromecast Memory Human Resources Google Maps Edge iOS Proactive Computer Accessories Reputation File Storage Specifications Wasting Time Connectivity Bloatware Regulation Display Consultant Legal Best Available Administrator Students Ciminal Computer Fan Websites Mouse Managed IT Service Emergency Colocation Running Cable Sales Content Filter Sync Access Inbound Marketing Unified Communications Benefits Programming Dark Web Data Theft Cleaning Hacker Vendor Near Field Communication Monitoring Adobe Transportation Twitter Financial Branding Gifts Analysis Amazon Screen Mirroring Relocation Employee-Employer Relationship Licensing WannaCry Flexibility Hybrid Cloud IT budget App store Cast Scam Testing Distributed Denial of Service IT consulting Paperless Office Financial Technology Customer Relationship Management Mobile Updates Webinar Nanotechnology Data storage IT service Microsoft Excel OneDrive Credit Cards Science Point of Sale Support Camera Reliable Computing Internet Exlporer Printing Professional Services Microsoft Word IT solutions Root Cause Analysis Document Management Wasting Money Domains File Sharing Identities Projects Television FAQ Identity HBO Computer Care Entertainment Uninterrupted Power Supply Virtual Desktop Tablets Device Security Windows 10s IoT Save Time Virtual Assistant Windows 7 Charger Data Privacy Computing Computer Forensics Current Events NFL Online Currency Hard Disk Drive Language Wearable Technology Settings Identity Theft Touchpad Alexa for Business Bluetooth Lifestyle USB Co-Managed Services HaaS Hard Drive Virtual Reality IT Management Regulations WIndows 7 Wireless Internet Buisness Word ISP Spyware Work/Life Balance SharePoint Legislation Telephone IT Technicians Evernote Chromebook WIndows Server 2008 IT Consultant Personal Information Cameras Managing Stress Files Busines Management Gamification Windows Ink Virus WPA3 Teamwork Comparison Presentation Hyperlink Trending Workers Smart Tech Upgrades Avoid Downtime

Mobile? Grab this Article!

QR-Code

Recent Comments

LanceOWitt Looking to Backup Your Data? Here are Your Options
18 October 2018
Yes, I am looking to backup my data and for this I go to best resume writing service for it profess...
Janina CSimons Tip of the Week: How to Add User Profile Management to Google Chrome
17 October 2018
That's an amazing thing to learn here that how to add user profile management to Google chrome and u...
Sandra JWysocki Tip of the Week: Protect Your Personal Information From Other PC Users With a Guest Account
15 October 2018
I think that is most important to protect your personal information from other users and this is eno...
Thomas CTaylor Protect Yourself in the Future By Learning from These Past Phishing Scams
18 September 2018
I am also learning from these past phishing scams to increase my information related to this. Check ...
JacquelineJHilton ITaaS: Transform Your IT Department Into a Service!
27 August 2018
It is a wonderful idea to transform the IT department into a service and I hope it give better resul...