0
The need to share
 Effectively treating patients requires sharing protected health information

between healthcare provid...
Compliance
 For the IT healthcare professional, ensuring that all the steps are taken for

protecting privacy and improvi...
Risk Assessment
 Engaging in a security HIPPA risk assessment under HITECH, Meaningful

Use, HIPAA and Omnibus Rules can ...
Finding balance
 The question becomes establishment of a system that effectively maintains

compliance with the reporting...
The Compliancy Group LLC.
55 Broadway Unit 684
Greenlawn, NY 11740
Contact No: 855 854 4722
Fax: 631.731.1643
Info@complia...
How to be hipaa compliant
How to be hipaa compliant
How to be hipaa compliant
How to be hipaa compliant
How to be hipaa compliant
Upcoming SlideShare
Loading in...5
×

How to be hipaa compliant

67

Published on

Published in: Marketing, Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
67
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "How to be hipaa compliant"

  1. 1. The need to share  Effectively treating patients requires sharing protected health information between healthcare providers. For instance, an elderly patient suffering from shoulder pain may be sent to a specialist for treatment. Having the ability to compare new x-rays with ones already taken would help the doctor diagnose and treat the problem. When the information needed is protected information belonging to another healthcare provider, even within the same facility, it can cause an issue. Getting the necessary information to the new doctor without breaching patient privacy is paramount.
  2. 2. Compliance  For the IT healthcare professional, ensuring that all the steps are taken for protecting privacy and improving security can be time-consuming. Routers, web servers, Smartphone’s, tablets and laptop computers must be safeguarded to prevent the unauthorized disclosure of healthcare information. Often the IT department is understaffed and over tasked. Assigning a dedicated full-time IT position to maintain safeguards may not be feasible.
  3. 3. Risk Assessment  Engaging in a security HIPPA risk assessment under HITECH, Meaningful Use, HIPAA and Omnibus Rules can be overwhelming. The complexity of these reporting period assessments only increases with the complexity of the facility. However, a small practice may not have the resources for a dedicated IT professional. It may fall to staff members to perform the IT risk analysis. Even if IT professionals are available, performing a risk assessment and ensuring compliance with all standards can stretch manpower to the limits.
  4. 4. Finding balance  The question becomes establishment of a system that effectively maintains compliance with the reporting requirements. This becomes a more pressing concern if non-IT personnel must complete the audit and submit reports. The answer for many healthcare facilities may be with software. A software package that is scalable, user-friendly and that meet legal requirements can help the healthcare provider to protect the privacy and security of patient health information.
  5. 5. The Compliancy Group LLC. 55 Broadway Unit 684 Greenlawn, NY 11740 Contact No: 855 854 4722 Fax: 631.731.1643 Info@compliancygroup.com http://www.compliancy-group.com
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×