(914) 595-2250        

Jeremie Scheiner

EZ MSP has been serving the Yonkers area since 2008, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alaskan Healthcare Organization Hit with Huge Fine for HIPAA Violation

b2ap3_thumbnail_fines_imposed_for_hipaa_400.jpgAmerican healthcare organizations must store and exchange patient data in ways that comply with the HIPAA law, or else face hefty fines. One mental health service in Alaska recently learned this lesson the hard way after being hit with a $150,000 fine. Is your healthcare organization’s IT infrastructure 100 percent HIPAA compliant?

Last December, the Office for Civil Rights (OCR) found Anchorage Community Mental Health Services (ACMHS) guilty of a breach of OCR’s electronic protected health information (ePHI) that affected more than 2,700 patient records.

As reported by The National Law Review, this whole fiasco could have easily been prevented if ACMHS stayed on top of their basic IT maintenances: “The OCR determined that the incident was the direct result of ACMHS’ failure to identify and address basic risks such as running outdated and unsupported software, and failure to regularly update software patches.” In addition to ACMHS being fined a cool $150k, they agreed to adopt a corrective action plan set by OCR.

The last thing your healthcare organization needs is to get slammed with a major fine like this. Additionally, having to take actions to rebuild trust with your patients may be more costly to your organization than a fine. To help your healthcare organization remain HIPAA compliant, be sure to implement these four HIPAA guidelines provided by The National Law Review:

  • The Security Rule, which relates to electronic PHI, continues to be a focus of the OCR;
  • A basic requirement of the Security Rule is that Covered Entities and Business Associates should regularly conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the security of electronic PHI;
  • Covered Entities and Business Associates should remain current on software and software patches to help avoid malware and other hacking incidents; and
  • HIPAA policies and procedures should be meaningful to your organization and should be regularly used, reviewed, and revised as necessary.

For security reasons like a breach experienced by ACMHS, it’s risky for any business to use unsupported software (like the infamous and no-longer-supported Windows XP), or to skip out on installing security patches. However, when it comes IT maintenances like these, a non-healthcare business has the option to roll the dice and risk not doing them. Due to the stricter-than-normal demands of HIPAA regarding the maintenance of IT systems, your healthcare organization doesn’t have the luxury of not updating your information technology.

Ultimately, these extra protections afforded by HIPAA are a good thing because they better protect patient information. Your healthcare organization having to jump through extra hoops may seem like an unneeded pain at times, but with a knowledgeable IT provider like EZ MSP overseeing your organization’s IT infrastructure, you can rest assured that your practice is HIPAA compliant. If you’re all squared away with HIPAA, then you can focus your time and energy on more important things than updating software and installing security patches, like taking care of your patient's health!

To make sure that your healthcare organization’s IT infrastructure is HIPAA compliant, give EZ MSP a call at (914) 595-2250.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 23 October 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Business Computing Hackers Internet Best Practices Hosted Solutions Backup Productivity Microsoft Business IT Services Software Malware IT Support Google Business Continuity Hardware Efficiency Disaster Recovery Mobile Device Management Windows Computer Miscellaneous Managed Service Provider VOIP Innovation Workplace Tips Data Save Money User Tips Network Security Server Network Email Smartphone Windows 10 Mobile Devices Mobile Computing communications Chrome Virtualization Android Business Management BYOD Microsoft Office Upgrade Social Media Outsourced IT Employer-Employee Relationship Information Technology Operating System Communication Holiday IT Solutions Managed IT Services Office Firewall Cybercrime Spam The Internet of Things Budget Remote Computing Computers Saving Money Avoiding Downtime Telephone Systems Hacking Hosted Solution Health Quick Tips Going Green Best Practice Small Business Managed IT User Error Remote Monitoring Alert Recovery WiFi Collaboration VPN Saving Time Browser Application Proactive IT Wireless Technology BDR Apple Bandwidth Big Data Data Backup Automation Tablet Facebook Gadgets Audit Gmail Data Management Phone System Unified Threat Management Apps Cost Management Disaster Ransomware Password Intranet Mobile Office Lithium-ion battery Data Security Hard Drives Analytics Maintenance Passwords iPhone Productivity Printer Cybersecurity Social Streaming Media Business Intelligence Outlook Compliance Marketing Smartphones Applications Risk Management Administration Unsupported Software Mobility Shortcut Content Filtering Phishing Data Recovery Government Social Engineering Emails Antivirus Law Enforcement Net Neutrality Office 365 App Meetings Data Storage Managed IT Services Router Laptop Network Congestion DDoS HIPAA Two-factor Authentication Travel Telephony Robot Money Fax Server Excel Private Cloud Office Tips Google Drive Search Printer Server Solid State Drive PowerPoint Biometrics IT Support History Customer Service Windows 10 Bring Your Own Device Internet of Things Encryption Cloud Computing Education Tech Support Humor Retail OneNote Value Politics Networking iOS Files Teamwork IT consulting Managed IT Service Point of Sale Paperless Office Consultant OneDrive Trending Sync Instant Messaging Data Loss Human Resources Support Computer Fan Chromecast Reputation Reliable Computing Computer Accessories Online Currency Touchscreen Wearable Technology Document Management Update Adobe Bloatware Google Docs Entertainment Dark Web Administrator Colocation Running Cable Screen Mirroring Mouse Save Time Licensing Benefits Vendor Management Access Hacker Cast Data Breach USB Wi-Fi Mobile Transportation Branding Regulations Nanotechnology IT Consultant ISP Relocation WIndows 7 Storage Webinar Safety Professional Services Cameras Root Cause Analysis Distributed Denial of Service Managing Stress HBO Busines Management Tablets Customer Relationship Management Users IT solutions Emergency Data storage IT service Presentation Augmented Reality eWaste User Data Protection Science NFL Windows 10s Internet Exlporer Domains Settings Computer Care Television Best Available IT Management Word Virtual Desktop Hard Disk Drive Uninterrupted Power Supply Programming SaaS WIndows Server 2008 Inbound Marketing Windows Ink Touchpad Bluetooth Near Field Communication Commerce Avoid Downtime HaaS Patch Management Virtual Reality Twitter Google Maps Buisness Vulnerability Sports SharePoint Current Events Upgrades IT Technicians Regulation

Mobile? Grab this Article!


Recent Comments

Will Takera Tip of the Week: Mirroring Your Android’s Screen, Made Easy
16 August 2017
Actually, Chromecast can also help with an Android phone mirroring. Referring to a YouTube video, I ...