Dec 9th, 2016
All eligible hospitals, critical access hospitals (CAHs), and dual-eligible hospitals seeking to demonstrate meaningful use of certified electronic health record technology (CEHRT) for the first time in 2017 must attest to Modified Stage 2 or Stage 3 objectives and measures. The EHR reporting period is a minimum of any continuous 90 days between Jan. 1, ...
A strong password and new technology solutions are your best defenses against hackers. by Arthur Gasch Authentication is verifying a person who is accessing data is the person authorized to do so. Authentication typically consists of a username and password. When coding, be sure to maintain a secure password when accessing electronic protected health information ...
Nov 30th, 2015
When we hear of a security breach involving electronic protected health information (ePHI), we often assume it was an outside job. That isn’t always the case. In fact, more often than not, employees cause violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy and Security Rules. Experian Information Solutions, Inc. reports ...
The first step to ensuring your patients’ ePHI is secure is assessing your office’s HIPAA compliance. By Joette Derricks, MPA, CMPE, CPC, CHC, CSSGB Prior to the HIPAA Security Rule, a generally accepted set of security standards to govern electronic protected health information (ePHI) didn’t exist. Today, all covered entities, including small health plans, are ...
Follow Stage II meaningful use and HIPAA security guidelines when sending ePHI. By Vernessa Fountain, RHIA, CTR Stage 2 of electronic health record (EHR) meaningful use requires secure messaging, using certified electronic health record technology (CEHRT), to be sent to more than 5 percent of unique patients (or their authorized representatives) who are being seen ...