Electronic health records security compliance

Email Alerts

Register now to receive SearchHealthIT.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • 2014 ONC certification standards put pressure on EHR rollouts

    Many healthcare provider CIOs are struggling with two new EHR upgrades for 2014 ONC certification standards. With a deadline fast approaching for ICD-10, though, health IT professionals must integrate them best they can and move on to the second majo... 

  • Best practices for mobile device security management

    Mobile health is becoming an integral component in the delivery of care, and IT departments must figure out how to integrate organization-issued as well as personal mobile devices onto networks. The data that flows through these networks and devices ... 

  • Penn Medicine’s approach to managing BYOD and security

    Trying to lock down senior leadership buy-in for IT security and a more HIPAA-compliant technology infrastructure might actually become a little easier, if they become motivated by the more stringent HIPAA omnibus mandates going into effect in Septem... 

  • Storage needs for data backup in health care

    When most think about HIPAA compliance, the first thing that comes to mind is data security and preventing a breach. But, in actuality, a lot more goes into being HIPAA compliant. Namely, there are several storage and data backup requirements every h... 

  • Managing IT in the electronic hospital

    The federal government's push for electronic healthcare records has made data security even more pressing. This e-book takes a look at where healthcare IT leaders should begin and what they should watch out for as they move to embrace the HITECH Act ... 

  • medical identity theft

    Medical identity theft is the illegal access and use of someone’s personally identifiable information to fraudulently obtain medical service, prescription drugs or medical insurance coverage. The types of information stolen can include name, social s... 

  • HIPAA business associate agreement (BAA)

    A HIPAA business associate agreement (BAA) is a contract between a HIPAA covered entity and a HIPAA business associate (BA) that is used to protect personal health information (PHI) in accordance with HIPAA guidelines. 

  • HIPAA covered entity

    A HIPAA covered entity is any organization or corporation that directly handles Personal Health Information (PHI) or Personal Health Records (PHR). 

  • HIPAA disaster recovery plan

    A HIPAA disaster recovery plan is a document that specifies the resources, actions, personnel and data that are required to protect and reinstate healthcare information in the event of a fire, vandalism, natural disaster or system failure.  

About Electronic health records security compliance

Electronic health records security compliance is a top priority. Learn about security systems and how, when and where to deploy encryption to secure personal health information and records, medical records, electronic health records and health systems, and manage secure health information systems under the requirements of HIPAA, HITECH and ARRA.