Use this checklist to determine if your policies, procedures and on-going print device security maintenance are vulnerable to threats.
Error - something went wrong!
Other content in this Stream
Phishing Scams in Healthcare: A Persistent Threat
Why Contingency Planning for Vendor Data Disputes Is Critical
A Strong Message on Improper PHI Disclosure to News Media
Breach Settlement Has Unusual Penalty
Mobile Devices in the Healthcare Academic Medical Center: Why Are They So Difficult to Control?
In today’s healthcare environment, mobile devices are rampant. Controlling the nature and method of data stored on these devices is not easy in most industries – and mobile devices in the...
Medicaid Data Breach Trends: An Analysis
Texas Retirement Agency Portal Breach Affects 1.25 Million
Anthem Mega-Breach: Record $16 Million HIPAA Settlement
Aetna Hit With More Penalties for Two Breaches
HIPAA lets providers text patients, but is it secure?
Why Is Providing Patients Access to Records So Challenging?
HHS OIG Launches Cybersecurity Web Page
Changes to New California Privacy Law Exempts Some Healthcare Organizations
Much has been written about the potential impacts that the California Consumer Privacy Act of 2018 (CaCPA) could make on health care organizations and their business partners. The California...
Responding to Ransomware Attacks: Critical Elements
Opioid Crisis Raises Tough Privacy Issues
Hospitals Fined $1 Million After TV Crews Film Patients
Hospital Insider PHI Theft Case: Lessons to Learn
User Access Monitoring: Convincing Your Governing Body that You Need to do This
User access monitoring is a requirement under the HIPAA Security Rule. However, the specifics of what must be done remain a little cloudy. The regulations state, “implement hardware, software,...
Are State AGs Picking Up Slack in HIPAA Enforcement?
David Holtzman was recently interviewed by Marianne Kolbasuk McGee of Information Security Media Group about The Arc of Erie County lawsuit which encountered a data breach that impacted more than...
Ohio Creates Incentives to Proactively Adopt Cybersecurity Programs