Phishing scam exposes PHI of patients at Colorado Mental Health Institute
As the year comes to an end, there appears to be no end in sight for healthcare data hacks. An employee at the Colorado Mental Health Institute at Pueblo recently fell for a phishing scam that potentially exposed the PHI of 650 patients.
CMA: CA SB 1386
CA SB 1386 PrivaPlan Associates Privacy Policy
CMA: HHS Source Materials
Asca August 14, 2002 Final Privacy Rule Changes December 3, 2002 Guidance Employer Identifier Final Rule Final HIPAA Omnibus Rule 2013 Final Privacy Rule Final Security Rule FinalEnforcementRule06 guidance-final HIPAA Title I Statutory Text March 2002 Privacy NPRM (proposed changes) NDC Code Repeal NPRM Proposed Employer Identifier Rule Proposed Privacy Rule Proposed Provider Identifier Rule […]
CMA: HIPAA Resources
HIPAA RESOURCES HHS OFFICE FOR CIVIL RIGHTS WEBSITE ON HIPAA:http://www.hhs.gov/ocr/privacy/index.html – Answers to Frequently Asked Questions, links to other HIPAA sites, and information on the law, regulations, and enforcement are located here. OFFICE OF THE NATIONAL COORDINATOR WEBSITE ON HIPAA AND MEANINGFUL USE: http://www.healthit.gov/providers-professionals/ehr-privacy-security
CMA: HIPAA Basics Quick Reference Primer
HIPAA TCS Solutions from PCI The information provided in this document is intended to arm you quickly with essential HIPAA information. Additional helpful reference materials can be found on the following websites. Please note that the lists provided below are examples of just some of the valuable references you will find on these sites. […]
CMA: Security Regulations
Disclaimer: The information provided in this document does not constitute, and is no substitute for, legal or other professional advice. Users should consult their own legal or other professional advisors for individualized guidance regarding the application of the law to their particular situations, and in connection with other compliance-related concerns. Final HIPAA Security […]
CMA: Definitions of Terms
Disclaimer: The information provided in this document does not constitute, and is no substitute for, legal or other professional advice. Users should consult their own legal or other professional advisers for individualized guidance regarding the application of the law to their particular situations, and in connection with other compliance-related concerns. Definitions of Terms […]
CMA: Compliance Criteria
Disclaimer: The information provided in this document does not constitute, and is no substitute for, legal or other professional advice. Users should consult their own legal or other professional advisors for individualized guidance regarding the application of the law to their particular situations, and in connection with other compliance-related concerns. HIPAA Privacy and […]
CMA: OCR Security Audit Protocol
OCR Security Audit Protocol The office of Civil Rights established Security Audit Protocol containing the requirements that are assessed through OCR performance audits as of July 2012.
CMA: OCR Privacy Audit Protocol
OCR Privacy Audit Protocol The office of Civil Rights established Privacy Audit Protocol containing the requirements that are assessed through OCR performance audits as of July 2012.