Catherine Short speaks with Cristin Gardner, Director of Consumer Products & Markets at Life Image a healthcare network for exchanging clinical and operational information including medical images, about “Upholding HIPAA…
Did You Receive an OCR Notice for the Phase 2 Audit? What’s Next?
Now that OCR has officially started the Phase 2 HIPAA Audit Program, are you adequately prepared to be an auditee? OCR is currently compiling its pools of potential auditees that…
Let’s Talk Trash
Do you ever have trouble figuring out which trash can to use when throwing something away? Even a simple cardboard coffee cup with a plastic lid may give you pause…
Individual’s Rights to Access PHI
An individual’s right to access their protected health information (PHI) should be nothing new to covered entities. In 1996, HIPAA Privacy Rule detailed an individual’s right to access PHI. As…
OIG WORKPLAN 2016
The Office of the Inspector General (OIG) is responsible for protecting the integrity of the programs in Health and Human Services against fraud, waste and abuse as well as recommending…
Overview of a Corporate Integrity Agreement (CIA)
Health care fraud recoveries for fiscal years 2009- 2014 exceeded previous records with five straight years of more than $2 billion in annual recovery from cases involving fraud and false…
Are You Prepared for the HIPAA Phase 2 Audits?
After reviewing the HIPAA Privacy case investigations from 2009-2011, the Office of the Inspector General sent a strong message to the Office of Civil Rights in regard to the administration…
How would your staff react to an auditor or investigator?
Audits and investigations are stressful events either with or without prior notice. Medical staff should be prepared for an unannounced visit. First Healthcare Compliance provides a sample policy that assists…
What is the Wall of Shame?
As part of HITECH, any breach of over 500 individuals will be posted on “The Wall of Shame” on the HHS website. It is important for covered entities to be…
Theft Tops Data Breach Incidents IN 2014
The OCR reports 54 data breach incidents affecting more than 500 people in first six months of 2014. About half are related to theft, most commonly involving laptops, desktop computers…