HIPAA Compliance Blog

avatar DHHS Issues Reminder to Address Physical Security, Particularly Workstation Security: HIPAA & HITECH Act Blog by Jonathan P. Tomes

In May 2018, the U.S. Department of Health and Human Services (“DHHS”) Office for Civil Rights (“OCR”) issued its Cybersecurity Newsletter, “Workstation Security: Don’t Forget .. read more

avatar Colorado Enacts a New Consumer Data Privacy Protection Law: HIPAA & HITECH Act Blog by Jonathan P. Tomes

The Colorado governor signed into law HB 1128, a new consumer data privacy protection law, which is intended to protect personal identifying information (“PII”). Effective .. read more

avatar A Court Order Isn’t Necessarily a Court Order. What is necessary and sufficient? HIPAA &HITECH Act Blog by Jonathan P. Tomes

HIPAA is hard to understand, even for lawyers. One of the hardest HIPAA concepts to understand and apply is the difference between necessary and sufficient .. read more

avatar Second Draft of NIST Cybersecurity Framework Published: HIPAA & HITECH Act Blog by Jonathan P. Tomes

The National Institute for Standards and Technology (“NIST”) has published its second draft of its revised Cybersecurity Framework (“the Framework”). Version 1.0 of the NIST .. read more

avatar New Sample Media Policy for Our Blog Readers: HIPAA & HITECH Act Blog by Jonathan P. Tomes

Merry Christmas! A Christmas Present from Jon and Alice Normally, we at Veteran’s Press and EMR Legal, our HIPAA publishing and consulting companies, reserve new .. read more

avatar OCR Clarification on Aspects of Privacy Rule after Man-made Disasters: HIPAA & HITECH Act Blog by Jonathan P. Tomes

The recent shooting attack in Las Vegas and other man-made disasters have prompted the Department of Health and Human Services (“DHHS”) Office for Civil Rights .. read more

avatar NCCoE and NIST Guidelines for Ransomware Recovery: HIPAA & HITECH Act Blog by Jonathan P. Tomes

Little doubt exists that ransomware is a major threat to the availability of health information. Ransomware is a type of malicious software from cryptovirology, a .. read more

seo by: k.c. seo