Disclosure of protected health information (PHI) for use in legal proceedings is permitted under certain circumstances. If a covered entity receives a court order that is signed by a judge, requesting PHI, it should comply with the order and provide the information that is specifically requested. If the practice receives a subpoena, discovery request, or… Continue reading
Continue readingPosts tagged hipaa
End of Support for Windows 7 and 8
Microsoft has announced its timetable regarding the end of support for Windows 7 and Windows 8. These dates may seem distant, but you will want to begin planning now, so that you can complete a transition prior to the end of support. Transition planning is important, because after support ends, security updates are no longer… Continue reading
Continue readingDisclosure of PHI Obtained From Other Providers
Patients have the right to request a copy of their medical record, and covered entities must provide it and include any information that was created by, or obtained from other healthcare providers that is contained in the patient record. The Privacy Rule states: “A covered entity is required to provide access to protected health information… Continue reading
Continue readingAcceptable/Responsible Use
Once a workforce member is granted access to a practice’s information systems (including computer hardware, software, email, voice mail, internet, telephone, cell phone, laptops, or other electronic equipment or service made available to employees or paid for by the practice), it is everyone’s responsibility to ensure that the systems are utilized in an acceptable manner… Continue reading
Continue readingDisclosure to Medical/Dental Device Companies
We are often asked whether a patient authorization is required in order to disclose protected health information (PHI) to a medical or dental device company. Similarly, practices have asked whether device companies will be considered business associates of the practice. The answer to both questions lies in whether or not the device company is considered… Continue reading
Continue readingMeaningful Use and Security Risk Analysis
Now that the final rule for 2015 meaningful use has been released, we have received some questions as to whether there are changes that will need to be made to our Security Risk Analysis template. The final rule was released on October 16, 2015, and changed the Medicare and Medicaid EHR Incentive Programs reporting period… Continue reading
Continue reading