Remote Support

(914) 595-2250      

Jeremie Scheiner

EZ MSP has been serving the Yonkers area since 2008, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alaskan Healthcare Organization Hit with Huge Fine for HIPAA Violation

b2ap3_thumbnail_fines_imposed_for_hipaa_400.jpgAmerican healthcare organizations must store and exchange patient data in ways that comply with the HIPAA law, or else face hefty fines. One mental health service in Alaska recently learned this lesson the hard way after being hit with a $150,000 fine. Is your healthcare organization’s IT infrastructure 100 percent HIPAA compliant?

Last December, the Office for Civil Rights (OCR) found Anchorage Community Mental Health Services (ACMHS) guilty of a breach of OCR’s electronic protected health information (ePHI) that affected more than 2,700 patient records.

As reported by The National Law Review, this whole fiasco could have easily been prevented if ACMHS stayed on top of their basic IT maintenances: “The OCR determined that the incident was the direct result of ACMHS’ failure to identify and address basic risks such as running outdated and unsupported software, and failure to regularly update software patches.” In addition to ACMHS being fined a cool $150k, they agreed to adopt a corrective action plan set by OCR.

The last thing your healthcare organization needs is to get slammed with a major fine like this. Additionally, having to take actions to rebuild trust with your patients may be more costly to your organization than a fine. To help your healthcare organization remain HIPAA compliant, be sure to implement these four HIPAA guidelines provided by The National Law Review:

  • The Security Rule, which relates to electronic PHI, continues to be a focus of the OCR;
  • A basic requirement of the Security Rule is that Covered Entities and Business Associates should regularly conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the security of electronic PHI;
  • Covered Entities and Business Associates should remain current on software and software patches to help avoid malware and other hacking incidents; and
  • HIPAA policies and procedures should be meaningful to your organization and should be regularly used, reviewed, and revised as necessary.

For security reasons like a breach experienced by ACMHS, it’s risky for any business to use unsupported software (like the infamous and no-longer-supported Windows XP), or to skip out on installing security patches. However, when it comes IT maintenances like these, a non-healthcare business has the option to roll the dice and risk not doing them. Due to the stricter-than-normal demands of HIPAA regarding the maintenance of IT systems, your healthcare organization doesn’t have the luxury of not updating your information technology.

Ultimately, these extra protections afforded by HIPAA are a good thing because they better protect patient information. Your healthcare organization having to jump through extra hoops may seem like an unneeded pain at times, but with a knowledgeable IT provider like EZ MSP overseeing your organization’s IT infrastructure, you can rest assured that your practice is HIPAA compliant. If you’re all squared away with HIPAA, then you can focus your time and energy on more important things than updating software and installing security patches, like taking care of your patient's health!

To make sure that your healthcare organization’s IT infrastructure is HIPAA compliant, give EZ MSP a call at (914) 595-2250.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 14 August 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Internet Business Computing Hackers Hosted Solutions Productivity Business Network Security Backup Software Microsoft Malware IT Services IT Support Google Hardware Efficiency Business Continuity VOIP Mobile Device Management Business Management Disaster Recovery Windows Mobile Devices Email Data Computer communications Managed Service Provider User Tips Innovation Network Miscellaneous Managed IT Services Workplace Tips Server Outsourced IT Smartphone Data Backup Save Money Tech Term Windows 10 Holiday Android Data Recovery Small Business Virtualization Mobile Computing Chrome Microsoft Office Cybersecurity Communication Browser Internet of Things Operating System Social Media Upgrade Cybercrime Productivity Saving Money BYOD Collaboration Best Practice Managed IT Employer-Employee Relationship Remote Computing IT Solutions Office BDR Phishing Smartphones Information Technology Spam The Internet of Things Firewall Apps Hacking Telephone Systems Automation Data Security Hosted Solution Remote Monitoring Alert Avoiding Downtime Health Quick Tips Going Green Application User Error Budget Computers Big Data Router Recovery Two-factor Authentication Cost Management Office 365 IT Support Gmail Cloud Computing WiFi Gadgets Saving Time VPN Wireless Technology Data Breach Tech Support Ransomware Proactive IT Tablet Facebook Money Intranet Streaming Media Maintenance Compliance Marketing Audit Passwords Data Management Phone System Applications Vulnerability Bring Your Own Device Risk Management Content Filtering Unified Threat Management Social Engineering Government Mobility Law Enforcement Apple Bandwidth Password App Mobile Office Travel Analytics Information Users Excel Data Protection Social Lithium-ion battery Business Intelligence Outlook Unsupported Software Hard Drives Google Drive Windows 10 iPhone Administration Printer Education Shortcut Retail Value OneNote Antivirus PowerPoint Networking Blockchain Disaster Managed IT Services History Update Google Docs Net Neutrality Redundancy Devices Network Congestion HIPAA DDoS Storage Fraud Telephony Robot Vendor Management Laptop Cortana Augmented Reality Private Cloud Search eWaste Printer Server Office Tips Wireless Charging Fax Server Biometrics Solid State Drive Project Management Customer Service Artificial Intelligence Commerce SaaS Patch Management MSP Management Humor Sports Politics Emails Wi-Fi Mobile Security Encryption Instant Messaging Data Storage Safety Data Loss Meetings Google Assistant Administrator Virtual Assistant Licensing IoT Data Privacy Colocation WannaCry Running Cable Mouse Computer Forensics Cast Cleaning Language Access Webinar Computing USB Benefits Alexa for Business Mobile Microsoft Excel Hard Drive Regulations Hacker Nanotechnology Current Events Online Currency Wearable Technology ISP Credit Cards Wireless Internet WIndows 7 Flexibility Spyware Professional Services Transportation IT solutions Branding File Sharing Chromebook Cameras Relocation Root Cause Analysis Point of Sale FAQ Gamification Managing Stress HBO Busines Management Tablets Virus Windows 10s WPA3 Smart Tech Presentation Distributed Denial of Service Computer Care Customer Relationship Management Charger Memory User Edge NFL Proactive Data storage Hard Disk Drive IT service IT Consultant File Storage Science Lifestyle Connectivity Settings Document Management Internet Exlporer Students Best Available IT Management Ciminal Word Websites Domains Legislation Content Filter Television Save Time Inbound Marketing Uninterrupted Power Supply Programming Virtual Desktop Evernote Unified Communications WIndows Server 2008 Windows Ink Data Theft Comparison Monitoring Near Field Communication Identity Theft Twitter Upgrades Workers Financial Google Maps Analysis Touchpad iOS Bluetooth Virtual Reality Specifications HaaS Work/Life Balance Consultant Amazon Buisness Updates Hybrid Cloud Regulation IT budget App store Computer Fan SharePoint Sales Financial Technology IT consulting Personal Information Managed IT Service Paperless Office IT Technicians Files Touchscreen OneDrive Microsoft Word Business Technology Sync Software as a Service Support Dark Web Teamwork Conferencing Printing Reliable Computing Avoid Downtime Trending Chromecast Human Resources Device Security Wasting Money Adobe Identities Identity Entertainment Reputation Computer Accessories Bloatware Gifts Legal Screen Mirroring Emergency

Mobile? Grab this Article!


Recent Comments

Nancy DThomas Has Malware Made a Home in Your Router?
02 August 2018
What a review
BOGNA Cook Protect Your Business with Strong Network Security Practices
16 July 2018
Cool you write, the information is very good and interesting, I'll give you a link to my site. His ...
BOGNA Cook Protect Your Business with Strong Network Security Practices
14 July 2018
It is somewhat fantastic, and yet check out the advice at this treat. Pineapple
BOGNA Cook The Underworld of Cybercrime, the Darknet
14 July 2018
clearlly if you had this posted on you would not...
BOGNA Cook Protect Your Business with Strong Network Security Practices
13 July 2018
Thanks for writing such a good article, I stumbled onto your blog and read a few post. I like your s...