HIPAA Compliance Blog

avatar A Court Order Isn’t Necessarily a Court Order. What is necessary and sufficient? HIPAA &HITECH Act Blog by Jonathan P. Tomes

HIPAA is hard to understand, even for lawyers. One of the hardest HIPAA concepts to understand and apply is the difference between necessary and sufficient .. read more

avatar Second Draft of NIST Cybersecurity Framework Published: HIPAA & HITECH Act Blog by Jonathan P. Tomes

The National Institute for Standards and Technology (“NIST”) has published its second draft of its revised Cybersecurity Framework (“the Framework”). Version 1.0 of the NIST .. read more

avatar New Sample Media Policy for Our Blog Readers: HIPAA & HITECH Act Blog by Jonathan P. Tomes

Merry Christmas! A Christmas Present from Jon and Alice Normally, we at Veteran’s Press and EMR Legal, our HIPAA publishing and consulting companies, reserve new .. read more

avatar OCR Clarification on Aspects of Privacy Rule after Man-made Disasters: HIPAA & HITECH Act Blog by Jonathan P. Tomes

The recent shooting attack in Las Vegas and other man-made disasters have prompted the Department of Health and Human Services (“DHHS”) Office for Civil Rights .. read more

avatar NCCoE and NIST Guidelines for Ransomware Recovery: HIPAA & HITECH Act Blog by Jonathan P. Tomes

Little doubt exists that ransomware is a major threat to the availability of health information. Ransomware is a type of malicious software from cryptovirology, a .. read more

avatar Joseph R. Borich, Esq., Is Now Vice President of Operations for EMR Legal and Veterans Press: HIPAA & HITECH Act Blog by Jonathan P. Tomes

EMR Legal and Veterans Press are pleased to announce that Joe Borich has joined both EMR Legal and Veterans Press as Vice President of Operations. .. read more

avatar Medical Device Security and HIPAA: A New Security Frontier. HIPAA & HITECH Act Blog by Jonathan P. Tomes

When one thinks about hackers going after electronic health information for identity theft or other nefarious purposes, one thinks about them attacking the electronic health .. read more

On July 10th, 2017, posted in: HIPAA Compliance Blog by Tags: , ,

avatar Hospital Patients Targeted in Scam: HIPAA & HITECH Act Blog by Jonathan P. Tomes

Identity thieves have been conducting a telephone phishing (originally defined as the fraudulent practice of sending emails purporting to be from reputable companies in order .. read more

seo by: k.c. seo