Blogs
Medical chronologies should be medical grade
After over 2 years of research, Telegenisys has developed the most authoritative Medical record indexing and medical summary/chronology format for attorneys involved in personal injury actions. Using this format, attorneys can look at medical facts in several...
Are you protected against malware hidden in DICOM file format?
Cylera labs recently researched and published their study on a "flaw" in the DICOM image format for communication of medical imaging information could be exploited to hide malware in MRI and CT scans alongside other patient data. This weakness in the DICOM image file...
Outsourcing – A new business approach towards workforce management
"Over the past few years, a great many business leaders have adopted a new approach to their workforce by turning their back on traditional employees in favor of outsourced professionals. even the admin, call answering and customer service function is being delivered...
Are you sharing PHI with vendors without signing BAA?
Maintaining sufficient HIPAA-compliance standards within an organization is necessary, however, there are circumstances when PHI is shared with the vendors through data-storage services, communication providers, or document-disposal companies. HHS has provided...
Telegenisys’s Pune office celebrated Indian independence day on august 15th
Telegenisys's Pune office celebrated Indian independence day on Aug 15th. With an average tenure over 2.5 years, Telegenisys is a great place to work and maintains a high level of employee morale. Telegenisys works on highly sensitive private data for many clients and...
Normalizing guidance for NPI database
The National provider identifier (NPI) standard is a health insurance portability and accountability act (HIPAA) administrative simplification standard that does help simplify things. You can go to the NPPES NPI Registry and search for any healthcare provider in the...
Medical summary in over 100 distinctive formats.
Medical summary provides a distinctive view of a patient's medical record. In order to develop an appropriate view, medical summaries are formatted for specific purposes. Developing such medical information requires consideration of privacy practices. With the...
HIPAA compliance: Physical security is as important as cyber security
Recently 1Texas-based cancer treatment center has been penalized with $4.3 million fine for three breaches linked to unencrypted devices. Breach happened from three incidents in 2012 and 2013 when an employee’s laptop was stolen at a residence and two unencrypted pen...
Are you aware of new guidance in HIPAA privacy rule?
The U.S. department of health and human Services (HHS) Office for civil rights (OCR) recently published new guidance on use of authorizations to use or disclose PHI for research and explains aspects of the individual’s right to revoke an authorization under the HIPAA...
Are your HIPAA breach notification procedures in compliance?
Colorado Gov. John Hickenlooper signed into law expansive consumer data legislation that orders all organizations report breaches inside 30 days, making it the most limited turnaround for any state. There are no exclusions from the notice control, which means...