Stephen Treglia writes in the New York Law Journal that "businesses are demanding law firms sign written agreements affirming their compliance with whatever regulatory requirements are faced by the client. As part of a HIPPA, DFS, GDPR relationship, clients will...
HIPAA privacy
Updates to our privacy policy
Updates to our privacy policy we have updated our privacy policy to cover the information gathered by this website and handled by our processes on behalf of our clients.You can find our new privacy policy at https://www.telegenisys.com/privacy-policy.html
HIPAA: When are business associates directly liable to safeguard PHI
The HHS office for civil rights (OCR) issued the last standard in 2013 to adjust the HIPAA privacy, Security, Breach notification, and Enforcement rules. Among different things, The last principle distinguishes arrangements of the HIPAA Rules that apply straight...
Are you protected against malware hidden in DICOM file format?
Cylera labs recently researched and published their study on a "flaw" in the DICOM image format for communication of medical imaging information could be exploited to hide malware in MRI and CT scans alongside other patient data. This weakness in the DICOM image file...
Are you sharing PHI with vendors without signing BAA?
Maintaining sufficient HIPAA-compliance standards within an organization is necessary, however, there are circumstances when PHI is shared with the vendors through data-storage services, communication providers, or document-disposal companies. HHS has provided...
Normalizing guidance for NPI database
The National provider identifier (NPI) standard is a health insurance portability and accountability act (HIPAA) administrative simplification standard that does help simplify things. You can go to the NPPES NPI Registry and search for any healthcare provider in the...
HIPAA compliance: Physical security is as important as cyber security
Recently 1Texas-based cancer treatment center has been penalized with $4.3 million fine for three breaches linked to unencrypted devices. Breach happened from three incidents in 2012 and 2013 when an employee’s laptop was stolen at a residence and two unencrypted pen...
Are you aware of new guidance in HIPAA privacy rule?
The U.S. department of health and human Services (HHS) Office for civil rights (OCR) recently published new guidance on use of authorizations to use or disclose PHI for research and explains aspects of the individual’s right to revoke an authorization under the HIPAA...
Are your HIPAA breach notification procedures in compliance?
Colorado Gov. John Hickenlooper signed into law expansive consumer data legislation that orders all organizations report breaches inside 30 days, making it the most limited turnaround for any state. There are no exclusions from the notice control, which means...
Updates to our privacy policy
We have updated our privacy policy to cover the information gathered by this website and handled by our processes on behalf of our clients.You can find our new privacy policy at https://www.telegenisys.com/privacy-policy.html