• Home
  • Blog
  • Contact
HIPAA ComplianceHIPAA Compliance
HIPAA ComplianceHIPAA Compliance
  • Home
  • Blog
  • Contact

Three Key Properties of HIPAA Privacy and Security of Protected Health Information

Sep 11, 2009

HIPAA.com has received from its readers requests for information on topics related to HIPAA Administrative Simplification Privacy and Security Rules...

HIPAA ‘Protected Health Information’: What Does PHI Include?

Sep 1, 2009

HIPAA.com has received from its readers requests for information on topics related to HIPAA Administrative Simplification Privacy and Security Rules...

CMS Issues New and Updated HIPAA and HITECH Act FAQs: EHR Incentive Payment Start Dates

Aug 27, 2009

The Centers for Medicare and Medicaid Services (CMS) periodically issues new and updated Frequently Asked Questions (FAQs).  HIPAA.com will periodically...

CMS Issues New and Updated HIPAA and HITECH Act FAQs: EHR Incentives

Aug 26, 2009

The Centers for Medicare and Medicaid Services (CMS) periodically issues new and updated Frequently Asked Questions (FAQs).  HIPAA.com will periodically...

HHS Secretary Delegates to ONC Head New HITECH Act Authority

Aug 20, 2009

Effective August 7, 2009, and published in the Federal Register on Tuesday, August 18, 2009, Secretary Kathleen Sebelius of the...

HHS Secretary Sebelius Delegates Oversight and Enforcement of HIPAA Security Rule to OCR

Aug 4, 2009

U.S. Health and Human Services (HHS) Secretary Kathleen Sebelius has delegated oversight and enforcement of the HIPAA Administrative Simplification Security...

Transmission Security Encryption: What to Do and How to Do It

Jul 14, 2009

In our series on the HIPAA Administrative Simplification Security Rule, this is the second of two implementation specifications for the...

Transmission Security Integrity Controls: What to Do and How to Do It

Jul 13, 2009

In our series on the HIPAA Administrative Simplification Security Rule, this is the first implementation specification for the Technical Safeguard...

Transmission Security: What This HIPAA Security Rule Technical Safeguard Standard Means

Jul 10, 2009

This is the fifth and last Technical Safeguard Standard of the HIPAA Administrative Simplification Security Rule.  It has two implementation...

Person or Entity Authentication: What to Do and How to Do It

Jul 9, 2009

In our series on the HIPAA Administrative Simplification Security Rule, this is the fourth Technical Safeguard Standard.  There is not...

  • 1
  • 2
  • …
  • 5
  • 6

Categories

  • 5010
  • American Recovery and Reinvestment Act
  • Enforcement
  • GINA
  • Health Care Reform
  • Health IT and HITECH
  • HIPAA Law
  • Identifiers
  • Meaningful Use
  • Privacy
  • Red Flags Rules
  • Security
  • Transactions & Code Sets
  • Uncategorized

Recent Posts

  • Contracting with Vendors that are NOT HIPAA Business Associates: Best Practices
  • HIPAA Breach: Who You Gonna Call?
  • Can I Be Sued for a HIPAA Violation?
  • Business Associate Agreements – a First Look at Indemnification
  • Gmail, Google Apps for Business HIPAA Business Associate Agreements

Archives

Contact Us

We're currently offline. Send us an email and we'll get back to you, asap.

Send Message
HIPAA- Health Insurance Portability Accountability Act

© 2023 · hipaa.com