social security cards for post Is SSA a covered entity?

2 min read

Is SSA a covered entity?

No, the Social Security Administration (SSA) is not a covered entity under HIPAA. According to the Department of Health and Human Services (HHS), the SSA does not meet the criteria outlined in HIPAA regulations, which define covered entities as...

Read More
digital business icons over a laptop screen for post Instances where the minimum necessary standard does not apply

1 min read

Instances where the minimum necessary standard does not apply

There are cases where full access to patient health is necessary, such as for diagnosis or public health purposes.The minimum necessary standard...

Read More
Image of magnifying glass and stick people for blog about OIG report uncovers potential misuse of health risk assessments, costing billions

2 min read

OIG uncovers potential misuse of health risk assessments

The Office of Inspector General (OIG) found that some Medicare Advantage (MA) companies may be using health risk assessments (HRAs) and chart reviews...

Read More
Image of someone typing for blog about Should direct care practices (DCPs) be HIPAA compliant? 

3 min read

Should direct care practices (DCPs) be HIPAA compliant? 

While not all DCPs are regulated by HIPAA, using HIPAA compliant email can help DCPs build patient trust through transparency and accountability. It...

Read More
Picture of machine parts for blog about The benefits of integrated behavioral health

2 min read

The benefits of integrated behavioral health

Mental and physical health often work in tandem and patients may experience physical symptoms as a result of mental health disorders. Primary care...

Read More
digital lock for post What is network segmentation?

2 min read

What is network segmentation?

Network segmentation is a security practice that involves dividing a computer network into smaller, manageable sub-networks (segments). This approach...

Read More
update symbol over keyboard for post Understanding thread hijacking for ‘account update’ phishing

2 min read

Understanding thread hijacking for ‘account update’ phishing

Hijacking communications between patients and providers often allows cybercriminals to extract information and solicit payments and other actions...

Read More
digital security lock for post Landmark Admin data breach exposes personal information of 800,000

1 min read

Landmark Admin data breach exposes personal information of 800,000

In May 2024, hackers breached Landmark Admin’s network, encrypting systems and stealing sensitive information from over 800,000 people.

Read More
physician with digital floating data graphic for post September 2024 healthcare data breach insights

2 min read

September 2024 healthcare data breach insights

According to the Office for Civil Rights (OCR) Breach Portal, healthcare data breaches saw a notable decline in September 2024, with only 34...

Read More
law gavel on cash for post HHS reaches $90K settlement in first Risk Analysis Initiative enforcement

1 min read

HHS reaches $90K settlement in first Risk Analysis Initiative enforcement

The HHS has settled its first enforcement action in the OCR’s Risk Analysis Initiative in a settlement with the Bryan County Ambulance Authority.

Read More
Image of someone using a tap to pay machine for blog about Laredo lawsuit challenges Medicaid eligibility DSH payments

1 min read

Laredo lawsuit challenges Medicaid eligibility DSH payments

Laredo Medical Center (Laredo) is suing Xavier Becerra, the Secretary of the HHS, over a Medicare payment dispute concerning low-income patient care.

Read More
Image of red key lock for blog about FAQs: Access controls

2 min read

FAQs: Access controls

Access controls are the security protocols and measures that determine who can access specific resources, systems, or information within an...

Read More
Image of data for article about The difference between limited data sets and deidentified information

2 min read

The difference between limited data sets and deidentified information

While related, deidentification and limited data sets are distinct concepts under HIPAA with each serving a specific purpose in the healthcare...

Read More