Since just before HIPAA went actively into effect I’ve done a lot of HIPAA compliance work for covered entities (CEs). In the past few years I’ve done around 200 business associate (BA) information security and program reviews for just one CE, and these don’t even scratch the surface for how many BAs each CE has…
Posts Tagged ‘security training’
Who Are Your Business Associates?
Thursday, October 8th, 2009HIPAA/HITECH Etc. Retention: Does Your Reality = Your Requirements?
Tuesday, October 6th, 2009Last month I had the great pleasure of being a guest on Scott Draughon and Anyck Turgeon’s MyTechnologyLawyer.com radio show for a segment entitled, “Is encryption enough to achieve privacy?”
I was pleasantly surprised to see a large number of great follow-up questions following the show!
I covered one of them in my post, “Don’t Throw Your Privacy Out The Window; Know How Your PII Is Used” Here are a couple more of those many questions I want to answer in this post…
Privacy For The Deceased
Wednesday, September 30th, 2009Late last month I posted, “HIPAA/HITECH Breach Notice Rule: Applies To PHI of Deceased Individuals + Training A Key Element” and since then I’ve had around half a dozen or so folks ask me to write about privacy for the deceased…
10 Smart Grid Consumer-to-Utility Privacy Concerns; Are There More?
Friday, September 25th, 2009I have had the great opportunity to participate in the NIST Smart Grid privacy standards group since July…
Don’t Throw Your Privacy Out The Window; Know How Your PII Is Used
Wednesday, September 23rd, 2009A couple of week’s ago I had the great opportunity and pleasure to speak with the both equally delightful and brilliant Anyck Turgeon and Scott Draughon on MyTechnologyLawyer.com about “Is encryption enough to achieve privacy?”
The feedback and followup to that show was spectacular! I got a ton of questions as a result. I will answer some of them here in the coming days. Here is the first…
How To Do Privacy Impact Assessments
Monday, September 21st, 2009Last week I was very fortunate to be able to speak at the IAPP Privacy Academy in Boston…
What Happens To Privacy During Pandemics?
Monday, September 14th, 2009I am talking to increasing numbers of privacy and information security pros who are concerned about not only getting their pandemic plans in place, but also wanting to know what kinds of privacy issues need to be addressed within the plans.
Is Encryption Enough to Achieve Privacy?
Thursday, September 10th, 2009Of course the answer is no. But there are many reasons! Tune in this afternoon at 4:00pm Pacific time to hear Anyck Turgeon, Scott Draughon and me discuss this topic and talk about encryption laws and the impacts to privacy. Here is the information about the event…
HITECH Impacts Over 734,178 “Small Business” HIPAA Covered Entities
Wednesday, September 9th, 2009The Department of Health and Human Services (HHS) 45 CFR Parts 160 and 164: “Breach Notification for Unsecured Protected Health Information; Interim Final Rule” (Breach Notice Rule) has been written about a lot. But much of what is written overlooks some of the very interesting prologue within that document that is very important to consider to frame the context within which the regulation was written…
HITECH Act Virtual ToC
Friday, September 4th, 2009This was another very busy week, and I didn’t have a chance to post as much as I would have liked. Part of what kept me busy was an unusually increased amount of email…