(914) 595-2250        

Jeremie Scheiner

EZ MSP has been serving the Yonkers area since 2008, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alaskan Healthcare Organization Hit with Huge Fine for HIPAA Violation

b2ap3_thumbnail_fines_imposed_for_hipaa_400.jpgAmerican healthcare organizations must store and exchange patient data in ways that comply with the HIPAA law, or else face hefty fines. One mental health service in Alaska recently learned this lesson the hard way after being hit with a $150,000 fine. Is your healthcare organization’s IT infrastructure 100 percent HIPAA compliant?

Last December, the Office for Civil Rights (OCR) found Anchorage Community Mental Health Services (ACMHS) guilty of a breach of OCR’s electronic protected health information (ePHI) that affected more than 2,700 patient records.

As reported by The National Law Review, this whole fiasco could have easily been prevented if ACMHS stayed on top of their basic IT maintenances: “The OCR determined that the incident was the direct result of ACMHS’ failure to identify and address basic risks such as running outdated and unsupported software, and failure to regularly update software patches.” In addition to ACMHS being fined a cool $150k, they agreed to adopt a corrective action plan set by OCR.

The last thing your healthcare organization needs is to get slammed with a major fine like this. Additionally, having to take actions to rebuild trust with your patients may be more costly to your organization than a fine. To help your healthcare organization remain HIPAA compliant, be sure to implement these four HIPAA guidelines provided by The National Law Review:

  • The Security Rule, which relates to electronic PHI, continues to be a focus of the OCR;
  • A basic requirement of the Security Rule is that Covered Entities and Business Associates should regularly conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the security of electronic PHI;
  • Covered Entities and Business Associates should remain current on software and software patches to help avoid malware and other hacking incidents; and
  • HIPAA policies and procedures should be meaningful to your organization and should be regularly used, reviewed, and revised as necessary.

For security reasons like a breach experienced by ACMHS, it’s risky for any business to use unsupported software (like the infamous and no-longer-supported Windows XP), or to skip out on installing security patches. However, when it comes IT maintenances like these, a non-healthcare business has the option to roll the dice and risk not doing them. Due to the stricter-than-normal demands of HIPAA regarding the maintenance of IT systems, your healthcare organization doesn’t have the luxury of not updating your information technology.

Ultimately, these extra protections afforded by HIPAA are a good thing because they better protect patient information. Your healthcare organization having to jump through extra hoops may seem like an unneeded pain at times, but with a knowledgeable IT provider like EZ MSP overseeing your organization’s IT infrastructure, you can rest assured that your practice is HIPAA compliant. If you’re all squared away with HIPAA, then you can focus your time and energy on more important things than updating software and installing security patches, like taking care of your patient's health!

To make sure that your healthcare organization’s IT infrastructure is HIPAA compliant, give EZ MSP a call at (914) 595-2250.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 20 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Internet Business Computing Best Practices Hackers Hosted Solutions Backup Software Microsoft Productivity Business Malware IT Services IT Support Google Business Continuity Hardware Efficiency Mobile Device Management Network Security Windows Disaster Recovery Email VOIP Computer Miscellaneous User Tips Managed Service Provider Innovation Workplace Tips Server Network Mobile Devices communications Business Management Data Save Money Smartphone Mobile Computing Outsourced IT Windows 10 Holiday Virtualization Android Data Backup Chrome Managed IT Services Social Media Small Business Managed IT BYOD Microsoft Office Best Practice Upgrade Employer-Employee Relationship Firewall Data Recovery Cybercrime Information Technology The Internet of Things Collaboration Operating System Productivity Communication IT Solutions Office Browser User Error Telephone Systems Hosted Solution Alert Spam Remote Computing Computers Avoiding Downtime Budget Saving Money Hacking Health Quick Tips Going Green VPN Saving Time Application Phishing Apps Wireless Technology Recovery Remote Monitoring WiFi Cybersecurity Gadgets Smartphones Mobility Marketing Audit Gmail Data Management Phone System Content Filtering Unified Threat Management Government Proactive IT BDR Automation Apple Bandwidth Two-factor Authentication Big Data Maintenance Tablet Facebook Social Shortcut Streaming Media Outlook Business Intelligence Compliance History Unsupported Software Windows 10 Administration IT Support Cloud Computing Vulnerability Retail OneNote Social Engineering Ransomware Cost Management Password App Office 365 Disaster Managed IT Services Intranet Excel Lithium-ion battery Mobile Office Hard Drives Passwords iPhone Data Security Analytics Google Drive Printer Applications Risk Management Data Protection Internet of Things Search PowerPoint Printer Server Sports Biometrics Encryption Networking Bring Your Own Device Tech Support Law Enforcement Commerce Education Humor Meetings Value Net Neutrality Emails Antivirus Politics Network Congestion Data Storage Storage DDoS Telephony Laptop Robot Data Breach Router Google Docs Money Private Cloud Redundancy HIPAA eWaste Fax Server Travel Office Tips Solid State Drive SaaS Customer Service Cortana Charger Computer Care NFL Touchpad Hard Disk Drive Bluetooth Settings HaaS Virtual Reality Lifestyle Best Available Wireless Charging IT Management Buisness Word SharePoint IT Technicians Inbound Marketing Programming Legislation Personal Information Evernote WIndows Server 2008 Files Windows Ink Near Field Communication Teamwork Trending Twitter Instant Messaging Current Events Comparison Avoid Downtime Workers Patch Management Chromecast Upgrades Human Resources Computer Accessories Google Maps Reputation iOS Update Bloatware Point of Sale Specifications Updates Regulation Administrator Consultant Mouse Colocation IT consulting Computer Fan Running Cable Paperless Office Managed IT Service Work/Life Balance OneDrive Sales Online Currency Microsoft Word Wearable Technology Sync Access Support Touchscreen Benefits Software as a Service Hacker Reliable Computing Dark Web Wi-Fi Conferencing Document Management Adobe Transportation Entertainment Branding Data Loss Relocation Vendor Management Screen Mirroring Safety Gifts Save Time Licensing IT Consultant WannaCry Distributed Denial of Service Cast Emergency Customer Relationship Management USB Identity Theft Mobile Data storage Regulations Webinar IT service Science ISP Microsoft Excel WIndows 7 Nanotechnology Internet Exlporer Credit Cards Professional Services Cameras IT solutions Domains Busines Management File Sharing Managing Stress Root Cause Analysis Television HBO Uninterrupted Power Supply Users Virtual Desktop FAQ Tablets Presentation Windows 10s Artificial Intelligence User Augmented Reality

Mobile? Grab this Article!


Recent Comments

Will Takera Tip of the Week: Mirroring Your Android’s Screen, Made Easy
16 August 2017
Actually, Chromecast can also help with an Android phone mirroring. Referring to a YouTube video, I ...

Blog Archive