SlideShare a Scribd company logo
1 of 2
Download to read offline
Significance of Complying with HIPAA and HITECH Act


                                       The Health Information Technology for Economic and
                                       Clinical Health Act or the HITECH Act is part of the
                                       American Recovery and Reinvestment Act of 2009
                                       (ARRA). ARRA contains incentives related to health
care information technology in general and contains specific incentives designed to
accelerate the adoption of electronic health record (EHR) systems among providers.

This legislation anticipates a substantial expansion in the exchange of electronic protected
health information (ePHI), the HITECH ACT also widens the scope of privacy and security
protections available under HIPAA as it increases the potential legal liability for non-
compliance and it provides for more enforcement.

Significance of HIPAA

Better known as the Health Insurance Portability and Accountability Act, HIPAA law was
initiated to achieve consumer protection in 1996. The law caters to the multitude of problems
that are often faced by patients when seeking medical treatment at the various different
healthcare units. To ensure an all encompassing public welfare and healthcare compliance, the
American administration has devised HIPAA. Besides offering safeguard to customers from
theft, financial scams, fake transactions, HIPAA also prevents exploitation or injustice done to
customers while they are opting for healthcare facilities or for certain policies.


HIPAA basically maintains a track record of one’s social security number, date of birth, address
of correspondence, and information regarding healthcare. It documents all the preceding case
histories of illness and the various kinds of treatment that was offered to the patient at that
point of time. There is also an account of the expenses that were incurred apart from this.

A personal healthcare record needs to be maintained, as a typical situation at healthcare
centers and hospitals is that a single patient is often diagnosed by more than one doctor. The
data cataloguing techniques are getting altered every alternate day with advancement in
technology. Files must exist in a methodical fashion to circumvent confusion as the case history
of a patient gets circulated from one medical department to another. HIPAA might not be able
to help you safeguard your interests, if your previous personal treatment details do not come in
handy.
The Importance of Complying with the HITECH Act

The HITECH ACT took effect in 2010, though it was signed
in 2009. HITECH encourages the adoption and meaningful
use of technology pertaining to health information. It
strengthens civil and criminal enforcement of the existing
HIPAA rules and regulations and for those not dealing with
the electronic transmission of health information
properly; HITECH Act paves the road for serious
consequences

Monetary fines under the HITECH Act are structured on
levels which escalate in proportion to the violations by the
offender. Based on the nature and the extent of the
violation and the nature and the extent of the harm resulting from the violation, the penalties
are decided. The penalties are decided based on the nature and the extent of the violation and
the nature and the extent of the harm resulting from the violation. The reputation of the
company can also be seriously hampered besides the monetary loss.

A company can ensure compliance by either hiring an attorney to help guide you through the
compliance or have a consultant visit your facility or purchase software other such compliance
tools to guide you through the process. Irrespective of what is chosen it is vital to ensure that
staff dealing with patients or clients is trained in a uniform, facility specific, HIPAA compliance
procedure. Although cumbersome, taking the time and making the investment to insure HIPAA
and hitech compliance has its dividends if the Department of Health and Human Services or the
Department of Justice ever decides to pay a visit.

Learn more about: audit log and log analysis

More Related Content

More from Aegify Inc.

Key featuresofcloudbasedsaas
Key featuresofcloudbasedsaasKey featuresofcloudbasedsaas
Key featuresofcloudbasedsaas
Aegify Inc.
 

More from Aegify Inc. (10)

Implications of hipaa non compliance
Implications of hipaa non complianceImplications of hipaa non compliance
Implications of hipaa non compliance
 
Address Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and ButsAddress Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and Buts
 
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChanneleGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
 
IT Compliance and Security Solutions
IT Compliance and Security SolutionsIT Compliance and Security Solutions
IT Compliance and Security Solutions
 
SecureGRC SB™ HIPAA and HITECH
SecureGRC SB™ HIPAA and HITECHSecureGRC SB™ HIPAA and HITECH
SecureGRC SB™ HIPAA and HITECH
 
Webinar on HIPAA/HITECH compliance services for healthcare industry
Webinar on HIPAA/HITECH compliance services for healthcare industryWebinar on HIPAA/HITECH compliance services for healthcare industry
Webinar on HIPAA/HITECH compliance services for healthcare industry
 
Importance of Healthcare Compliance Solutions
Importance of Healthcare Compliance SolutionsImportance of Healthcare Compliance Solutions
Importance of Healthcare Compliance Solutions
 
Key featuresofcloudbasedsaas
Key featuresofcloudbasedsaasKey featuresofcloudbasedsaas
Key featuresofcloudbasedsaas
 
NetWitness Decoder
NetWitness DecoderNetWitness Decoder
NetWitness Decoder
 
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCSecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRC
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 

Recently uploaded (20)

FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 

Significance of Complying with HIPAA and HITECH Act

  • 1. Significance of Complying with HIPAA and HITECH Act The Health Information Technology for Economic and Clinical Health Act or the HITECH Act is part of the American Recovery and Reinvestment Act of 2009 (ARRA). ARRA contains incentives related to health care information technology in general and contains specific incentives designed to accelerate the adoption of electronic health record (EHR) systems among providers. This legislation anticipates a substantial expansion in the exchange of electronic protected health information (ePHI), the HITECH ACT also widens the scope of privacy and security protections available under HIPAA as it increases the potential legal liability for non- compliance and it provides for more enforcement. Significance of HIPAA Better known as the Health Insurance Portability and Accountability Act, HIPAA law was initiated to achieve consumer protection in 1996. The law caters to the multitude of problems that are often faced by patients when seeking medical treatment at the various different healthcare units. To ensure an all encompassing public welfare and healthcare compliance, the American administration has devised HIPAA. Besides offering safeguard to customers from theft, financial scams, fake transactions, HIPAA also prevents exploitation or injustice done to customers while they are opting for healthcare facilities or for certain policies. HIPAA basically maintains a track record of one’s social security number, date of birth, address of correspondence, and information regarding healthcare. It documents all the preceding case histories of illness and the various kinds of treatment that was offered to the patient at that point of time. There is also an account of the expenses that were incurred apart from this. A personal healthcare record needs to be maintained, as a typical situation at healthcare centers and hospitals is that a single patient is often diagnosed by more than one doctor. The data cataloguing techniques are getting altered every alternate day with advancement in technology. Files must exist in a methodical fashion to circumvent confusion as the case history of a patient gets circulated from one medical department to another. HIPAA might not be able to help you safeguard your interests, if your previous personal treatment details do not come in handy.
  • 2. The Importance of Complying with the HITECH Act The HITECH ACT took effect in 2010, though it was signed in 2009. HITECH encourages the adoption and meaningful use of technology pertaining to health information. It strengthens civil and criminal enforcement of the existing HIPAA rules and regulations and for those not dealing with the electronic transmission of health information properly; HITECH Act paves the road for serious consequences Monetary fines under the HITECH Act are structured on levels which escalate in proportion to the violations by the offender. Based on the nature and the extent of the violation and the nature and the extent of the harm resulting from the violation, the penalties are decided. The penalties are decided based on the nature and the extent of the violation and the nature and the extent of the harm resulting from the violation. The reputation of the company can also be seriously hampered besides the monetary loss. A company can ensure compliance by either hiring an attorney to help guide you through the compliance or have a consultant visit your facility or purchase software other such compliance tools to guide you through the process. Irrespective of what is chosen it is vital to ensure that staff dealing with patients or clients is trained in a uniform, facility specific, HIPAA compliance procedure. Although cumbersome, taking the time and making the investment to insure HIPAA and hitech compliance has its dividends if the Department of Health and Human Services or the Department of Justice ever decides to pay a visit. Learn more about: audit log and log analysis