Healthcare Organizations Prepare for Upcoming OCR HIPAA Audit Season

by ID Experts

Healthcare organizations and business associates may soon be hearing from the Health and Human Resources (HHS) Office for Civil Rights (OCR), as the agency prepares to conduct a new phase of audits. Scheduled to begin in the fall, OCR Audits Phase 2 will be conducted by the OCR itself and will focus on high-risk areas and enforcement.

Read More »

ID Experts Announces Issuance of U.S. Patent for RADAR

by ID Experts

On April 22, 2014, the U.S. Patent and Trademark Office granted ID Experts U.S. Patent No. 8,707,445:  Systems and Methods for Managing Data Incidents for our industry leading incident management software, RADAR. The patent covers systems and methods for managing a data incident including data breach data that comprises information corresponding to a suspected data breach incident.

Read More »

Harm Standard: Gone But Not Forgotten? New Factors Mimic Current Breach Regs

by ID Experts

Although covered entities (CEs) have been required since 2009 to notify affected individuals and the gov­ernment, when appropriate, of breaches of unsecured protected health information (PHI), the so-called “harm” standard that triggers notice no longer exists under the new final regulations. Or does it?

Read More »

HIPAA Omnibus Final Rules: What you need to know and do

by ID Experts

Join us for an in-depth analysis of the final rules with Adam Greene, a nationally-recognized authority on HIPAA and the HITECH Act and Partner with Davis Wright Tremaine, LLP and Mahmood Sher-Jan, Vice President of Product Management at ID Experts, including expectations of regulatory enforcement and specific recommendations for compliance. Adam and Mahmood will cover:

Read More »

2013 Data Privacy, Information Security and Cyber Insurance Trends Report Released

by ID Experts

This exclusive report released by Cyber Data Risk Managers has many well known top industry experts that have offered their thoughts on what they think, feel and should happen in 2013 as it pertains to Data Privacy, Information Security and Cyber Insurance and what steps can be taken to mitigate risk. Several experts also share their thoughts on "why organizations may or may not be rushing to purchase cyber insurance."

Read More »

The Final Rule Contest Comes to an End!

by ID Experts

We are excited to announce the winner of our Final Countdown contest!  With hundreds of entries this person was only 10 days off, which is impressive considering we received guesses ranging the span of 2 years!

Read More »

Avoiding Increased Risks and Liabilities under the Just Released HITECH/HIPAA Rules

by ID Experts

Guest Article by Stephanie Cason, Associate at Powers Pyle Sutter and Verville.

The Health Information Technology for Economic and Clinical Health (“HITECH”) Act, enacted on February 17, 2009, was designed to promote the widespread adoption and standardization of health information technology.  It supports this goal by adding amendments designed to strengthen the privacy and security protections of health information established by HIPAA and contained provisions that substantially expanded the HIPAA Privacy, Security, and Enforcement Rules.

Read More »

Identity theft and the recession, a guide

by ID Experts

Scammers and identity thieves often take advantage of fears, hopes and dreams. This is what makes some of their crimes so emotionally devastating to victims. Often the fraud or scam they are running appears to be the only hope in the victim’s life, until the true intentions are revealed.

Read More »

Enhanced HIPAA Penalties Raise Stakes for Employers and Health Care Providers

by ID Experts

While HIPAA’s recently enhanced penalty provisions and newly enacted security breach notification requirements have each received a significant amount of attention, the connection between them and its significant implications for employers and health care providers subject to HIPAA have not. Most significantly, because of the enhanced penalties, it is critical that covered entities conduct a careful and documented risk assessment before deciding not to provide notice of a security incident.

Read More »
Page 1 of 1 pages