Giva Blog
Help Desk, Customer Service, Cloud & Security Insights, with a Side of Altruism!

4 Reasons Why It is Important to Have Secure Business Associates

HIPAA Business Associates Data Security

The number of breaches of unsecured protected health information (PHI) on record in the United States is over 2000 and counting. Significantly, these records only cover breaches affecting 500 or more individuals. One can only wonder how many more breaches have occurred on a smaller scale. The types of breaches range from theft and hacking, to improper disposal and unauthorized access as a result of negligence. Such incidents can be avoided if covered entities (companies involved in healthcare) ensure that all of their business associates are secured. There are many reasons why it is important to have secure business associates. Being aware of these reasons may prompt covered entities to take the necessary measures to protect their clientele's information:

[Read More]

2 Important Recommendations That Can Help Ensure HIPAA Compliance

HIPAA Compliance Tips

For healthcare organizations, remaining HIPAA compliant can be both necessary and challenging. In the United States, healthcare organizations are required to abide by the Health Insurance Portability and Accountability Act (HIPAA) of 1996. This act provides guidelines pertaining to the handling of patient information across a number of platforms.

In an article by Kristen Lee, titled Q&A: The main reason healthcare organizations violate HIPAA, an interview is conducted with Michael Archuleta, director of IT and HIPAA security officer at Mt. San Rafael Hospital in Trinidad, Colorado. It is within this interview that Archuleta recommends two important items that can ensure HIPAA compliance:

[Read More]

Why HIPAA Violations are Becoming Common Among Healthcare Organizations

HIPAA Compliance Healthcare Organizations

In the United States, healthcare organizations are required to abide by the Health Insurance Portability and Accountability Act (HIPAA) of 1996. This act provides guidelines pertaining to the handling of patient information across a number of platforms. When healthcare organizations are looking for cloud solutions to manage their data, ensuring that it is HIPAA compliant is a necessity.

[Read More]

How New AI Cloud Technologies Could Help Save Lives in Healthcare Emergencies

Healthcare AI Cloud Computing

New technologies in healthcare are being implemented at an increasingly rapid pace, creating game changers in the way medical personnel approach, diagnose and treat life threatening emergencies.

[Read More]

Infrastructure & Cloud Services Becoming Important Necessities for Healthcare Organizations

Cloud Security Healthcare & HIPAA

Long gone are the days when healthcare organizations could not trust cloud security to manage their protected health information. In fact, healthcare organizations are increasing their dependence on cloud technology. What had begun as cloud deployment on back office applications has now expanded into an end-to-end solution that includes analytics and patient facing tools, among many others.

[Read More]

How CareLoop is Improving Healthcare Communication

Careloop Social Media for Doctors & Patients

UCHealth Denver tested the real-time social feed, CareLoop, and its effectiveness with regard to its spread of messages and information. CareLoop is essentially Facebook for patients; it is a medium that facilitates messages from medical professionals, questions from patients, test results, explanations, even providing users with information on possible symptoms and what they should be expecting in terms of certain procedures and medicines. Like most social media sites, CareLoop is a live feed, allowing patients to acquire their information and stay current up to the minute. Physicians and nurses have more opportunities to communicate with their patients without the necessity of a face-to-face visit.

[Read More]

How A White Hat Hacker Helped to Avoid a Healthcare Security Disaster

White Hat Hacker Helping Healthcare Data Security

On December 29, 2016, Department of Defense subcontractor Potomac Healthcare was notified about the jeopardizing of more than 11 gigabytes of private data for healthcare workers employed by the U.S. military's Special Operations Command. The compromised files were discovered by white hat hacker, Chris Vickery, who uncovered a flaw in an unprotected remote synchronization service. Upon his discovery, Vickery notified Potomac Healthcare about the insecurity of its data, which contained information dating back to 1988, and included names, locations, Social Security numbers, salaries and assignment units for psychologists, nurses and other Special Operations Command workers, some of which had top secret clearances.

[Read More]

Upcoming 2017 Healthcare IT Events in Canada

Healthcare IT Conferences & Summits in Canada

In an effort to assist our Canadian business, Giva has compiled a listing of upcoming 2017 healthcare IT conferences and summits. We hope this will be helpful to you!

[Read More]

What Deloitte’s Poll Tells Us About Blockchain Technology Adoption

Blockchain Technology

Consulting agency, Deloitte, is reporting that the healthcare industry will begin to heavily implement Blockchain technology in 2017. Despite the uneven understanding of Blockchain, its possibilities as a distributed database are garnering popularity and adoption from multiple fields. The technology offers advanced security and data storage, as well as interoperability, which makes it an asset in the healthcare field. Health and life sciences are primed to be the two leading industries in Blockchain deployment going forward this year, with financing, manufacturing, media, and telecom services expected to follow suit.

[Read More]

What It Means To Be HIPAA Compliant

HIPAA Compliance

The Health Insurance Portability and Accountability Act (HIPAA) was established in the U.S. in 1996 to protect an individual's personal health care information. Healthcare institutions are required to meet all standards and comply with the appropriate security measures in order to safeguard patient data. These standards became enforceable by law on 21 April, 2005.

[Read More]

 

Newer Entires     1   2   3   4   5   6   7   ...   19     Older Entries