Articles
It is required under the HIPAA Security Rule that you monitor user activity that accesses ePHI....
What is PHI and ePHI?PHI stands for Protected Health Information. There are 18 identifiers and includes patient...
What is Recognized Security Practices?When an organization is investigated by the Office for Civil Rights a minimum of a one year look...
What is a Business Associate?A Business Associate is a person or entity that performs certain functions or activities that...
What is a Data Breach?A breach is defined as an impermissible use or disclosure of Protected Health Information (PHI)....
What is a Good Faith Estimate?When scheduling an item or service, or if requested by an individual, providers and facilities...
What is a Security Risk Analysis?All medical practices and business associates must conduct a HIPAA Security Risk Analysis under...
What is the HIPAA Security Rule?The National Institute of Standards and Technology (NIST) wrote the Security Rule. The...
What is the No Surprise Billing Act?The No Surprises Act protects patients covered under group and individual health plans from...
What is the OIG exclusions list?OIG (Office of Inspector General) Exclusions list: It is very important to make sure you do not...