2 min read
Confidentiality in conflict management
Conflicts are inevitable in any workplace, from misunderstandings between patients and providers to disagreements among healthcare staff.
2 min read
Conflicts are inevitable in any workplace, from misunderstandings between patients and providers to disagreements among healthcare staff.
2 min read
Terminating a business associate agreement (BAA) means ending the legal contract between a covered entity and a business associate. This action...
2 min read
Implementing the Health Insurance Portability and Accountability Act (HIPAA) and upholding patient privacy heavily relies on fundamental ethical...
2 min read
While efforts have been made to address privacy and security in software development, one aspect that is usually ignored is traceability.
3 min read
Research on Video Relay Interpretation (VRI) indicates that video conferencing can help deaf patients overcome interpretation barriers and enhance...
2 min read
The legal liabilities stemming from data breaches are extensive and multifaceted. Beyond fines and lawsuits, organizations risk long-term damage to...
2 min read
Yes, remote monitoring technologies (RMTs) should be HIPAA compliant.
2 min read
Ethical compliance and conduct standards (ECCS) outline acceptable behaviors and practices for staff. An International Journal of Research in...
2 min read
Health Information Exchanges (HIEs) have the potential to transform health care by providing secure and efficient access to patient data. These...
3 min read
Protected health information (PHI) is among the most sensitive data in healthcare, and safeguarding establishes patient privacy, maintains trust, and...
1 min read
Patients can be charged a fee for requesting a copy of their protected health information (PHI), but the fee must comply with the guidelines set...
3 min read
In 2024, the Office for Civil Rights (OCR) within the Department of Health and Human Services (HHS) made strides in enforcing civil rights and...
1 min read
The HHS Security Series notes, “When the final Security Rule was published, the security standards were designed to be “technology neutral” to...