Solved

HIPPA with IT

Posted on 2014-11-04
5
76 Views
Last Modified: 2014-11-18
Hello, can someone recommend some HIPPA training / seminar for IT compliance?

I want to learn what is consider compliant and what is not in regards to email, fax, security, operating systems (e.g. Win XP), etc..  

I want to clearly articulate to my clients what is compliant and what is NOT so that I can be informative and also make sure I don't have any liability if they decide not to address IT issues.

Can anyone recommend anything?
0
Comment
Question by:tucktech
  • 3
  • 2
5 Comments
 
LVL 11

Assisted Solution

by:David Kroll
David Kroll earned 500 total points
ID: 40422280
0
 

Author Comment

by:tucktech
ID: 40450095
Hello David, thank you for the link.  I am trying to figure out how I can provide my client's a "sure" way of being specific to being HIPAA compliant when it comes to technology/IT.

The whole things seems very vague and a lot of miss information.  For example, I have a dentist in the area that will not fax me an invoice for my son because of HIPAA compliance.  That is their policy and they are sticking to it.   I don't believe faxing a document is an issue. I do respect the dentist and it is his decision to keep that policy or not.  However, it makes me wonder if I should advise my clients in faxing is NOT HIPAA compliant.  

Note the front desk lady at the dentist office will use the excuse of HIPAA but I am pretty sure this is not the case.  Then again, I want to be sure what I am recommending to my clients is accurate and true.

In addition, as and EXAMPLE, I want to keep out of any liability issues.  If I tell my clients it is ok to fax, and they do and get in trouble because of it I don't want to be held liable.

Bottom line is that I want to be educated in HIPAA to know what I am saying is correct and that I can provide recommendations to my clients and warn them of risks.

Again, I appreciate your link but it does not completely address what I have asked.
0
 
LVL 11

Assisted Solution

by:David Kroll
David Kroll earned 500 total points
ID: 40450112
0
 
LVL 11

Accepted Solution

by:
David Kroll earned 500 total points
ID: 40450114
0
 

Author Closing Comment

by:tucktech
ID: 40450137
David, that is what I needed, awesome.  Thank you for the quick response.
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
Where to go on the main page to find the job listings. How to apply to a job that you are interested in from the list that is featured on our Careers page.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

806 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question