Posted by - September 28, 2016

Understanding the Basics of HIPAA

Breaking the Health Information Portability and Accountability Act can quickly add up for many businesses regulated by this act. Most of you might know this as HIPAA.

Ast a company millions of dollars annually, even if the breach is perpetrated by a contracted third party.

These third-party contractors are often times IT companies, so ensuring your IT provider is knowledgeable with HIPAA regulations is a huge priority and should be a mitigating factor when selecting one.

What are the top breaches of HIPAA? 

The top breaches of HIPAA are theft, unauthorized access/disclosure, and hacking. Theft includes not just the loss of cyber data, but also the taking of physical property, such as laptops.

Leaving documents out in the open or failing to dispose of them properly falls under the disclosure reason, and malware, including ransomware, is a good example of hacking.

Read the full article to understand more the complexities of the ways your business needs to protect itself with regards to HIPAA, with even some basics as ensuring cables and locks are attached to laptops to prevent basic theft.

The Fallout of a HIPAA Breach

Breaking the Health Information Portability and Accountability Act (HIPAA) can result in significant financial consequences for businesses subject to its regulations. Even if a data breach originates from a third-party contractor, companies may still face millions in penalties.

Breaking the Health Information Portability and Accountability Act (HIPAA) can be costly for businesses under its regulations. Commonly known as HIPAA, violations can lead to millions in penalties, even if a third-party contractor is responsible.

Often, these contractors are IT companies. So, it’s critical to choose an IT provider familiar with HIPAA regulations. This knowledge should be a key factor in your decision.

Please contact Optfinity today for more information.

Leave a Reply

Your email address will not be published. Required fields are marked *