Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

HIPAA IT requirements

Posted on 2004-10-04
3
Medium Priority
?
214 Views
Last Modified: 2010-04-11
I just started as  network admin for a small rural hospital.  I don't think they've done anything to ensure HIPAA compliance from the IT side.  Did I mention that I'm the ONLY IT person at the hospital???  I need to know where to get started learning how to get compliant, as I've never worked in a health care facility before.


Any suggestions?
0
Comment
Question by:maharlika
3 Comments
 
LVL 18

Assisted Solution

by:luv2smile
luv2smile earned 400 total points
ID: 12220179
Try contacting larger hospitals and seeing if you can get a copy of their IT policies and possibly talk with their IT staff. Writing solid policies and procedures and then implementing and following them is key to being compliant to any regulations.
0
 
LVL 20

Accepted Solution

by:
DVation191 earned 400 total points
ID: 12220425
When I was faced with this issue, I had trouble finding concrete information. I ended up just downloading the rules and reading them. Now I know why things are so vague...because the rules themselves are vague.

I went to the website below. Read up on HIPAA, especially the Security and Privacy Rules, which probably apply to you more than anything else on that site.
http://www.ihs.gov/AdminMngrResources/HIPAA/ERRoom.cfm#HIPAA_Rules
0
 
LVL 3

Author Comment

by:maharlika
ID: 12221718
Both good comments.  I'll be doing both
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

An overview of cyber security, cyber crime, and personal protection against hackers. Includes a brief summary of the Equifax breach and why everyone should be aware of it. Other subjects include: how cyber security has failed to advance with technol…
Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question