Solved

HIPAA IT requirements

Posted on 2004-10-04
3
210 Views
Last Modified: 2010-04-11
I just started as  network admin for a small rural hospital.  I don't think they've done anything to ensure HIPAA compliance from the IT side.  Did I mention that I'm the ONLY IT person at the hospital???  I need to know where to get started learning how to get compliant, as I've never worked in a health care facility before.


Any suggestions?
0
Comment
Question by:maharlika
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 18

Assisted Solution

by:luv2smile
luv2smile earned 100 total points
ID: 12220179
Try contacting larger hospitals and seeing if you can get a copy of their IT policies and possibly talk with their IT staff. Writing solid policies and procedures and then implementing and following them is key to being compliant to any regulations.
0
 
LVL 20

Accepted Solution

by:
DVation191 earned 100 total points
ID: 12220425
When I was faced with this issue, I had trouble finding concrete information. I ended up just downloading the rules and reading them. Now I know why things are so vague...because the rules themselves are vague.

I went to the website below. Read up on HIPAA, especially the Security and Privacy Rules, which probably apply to you more than anything else on that site.
http://www.ihs.gov/AdminMngrResources/HIPAA/ERRoom.cfm#HIPAA_Rules
0
 
LVL 3

Author Comment

by:maharlika
ID: 12221718
Both good comments.  I'll be doing both
0

Featured Post

Forrester Webinar: xMatters Delivers 261% ROI

Guest speaker Dean Davison, Forrester Principal Consultant, explains how a Fortune 500 communication company using xMatters found these results: Achieved a 261% ROI, Experienced $753,280 in net present value benefits over 3 years and Reduced MTTR by 91% for tier 1 incidents.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The next five years are sure to bring developments that are just astonishing, and we will continue to try to find the balance between connectivity and security. Here are five major technological developments from the last five years and some predict…
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question