The Government Investigated it’s own EHR and found that it is not functioning as expected

Category: 

One of the side effects of the events at the Phoenix AZ VA investigation is that the OIG had discovered that the audit controls in VistA the EHR utilized by VA hospitals was not turned on.
The absence of an audit trail for appointment scheduling limited the ability for both VA brass and OIG investigators “to determine whether any malicious manipulation of the VistA data occurred,” the report authors said. OIG recommended that the VA “immediately enable” this audit function at all VA facilities. “The VA completed this action,” the OIG report said.

Automatically lock out Windows 7 users after incorrect password guesses

Category: 

This is a basic one for HIPAA security and it is not hard to do. When someone enters the wrong password 5 times, you should lock them out for at least 30 minutes.

Why would you do this? It stops someone from running an attack on a computer if they find out a valid username.

The article is here: http://resetchangewindows7password.com/automatically-lock-out-windows-7-...

Did AOL CEO’s comments violate HIPAA?

Category: 

Did AOL CEO’s comments violate HIPAA?

The CEO of AOL, in a call with workers blames costs on two moms who had babies in distress. Personally Identifiable Information? Well, if that is enough for people to know about whom he was talking, you bet!

Follow the link below to see Attorney Bill Frumkin on the fallout from AOL CEO Tim Armstrong’s comments on foxnews.com

http://video.foxbusiness.com/v/3182881378001/did-aol-ceos-comments-viola...

Getting Ready for Disaster Recovery

One of the important aspects of your Risk Mitigation Plan is you Disaster Recovery Plan. A recent article in Health IT News http://www.healthcareitnews.com/news/disasters-happen-best-be-ready?sing... discusses disasters and some approaches to disaster recovery.
When we talk about HIPAA security there are three events we must protect against
• Breaches in Confidentiality of Data
• Lack of Availability of Data
• Damage to the integrity of Data

Proper Disposal of Computers

It is not the whole computer that you need to worry about, it is about the storage of data in the computer. The storage of data is on your hard drive in your computer. It is also VERY IMPORTANT to realize that computers are NOT the only devices that you need to remove sensitive information from before they leave your office.

Pages

User login

CAPTCHA
This question is for testing whether you are a human visitor and to prevent automated spam submissions.