Access your Pro+ Content below.
Building HIPAA compliance, patient privacy investment business cases
This article is part of the Pulse issue of May 2013
CAMBRIDGE, Mass. -- In the face of generally declining reimbursements and tightening budgets, it's tough for healthcare IT leaders to advocate for budget increases. That goes double for new capital investment in patient privacy and data security initiatives, because it's hard to prove the ROI on preventing HIPAA compliance calamities. But that's exactly what health IT professionals are going to have to do, in light of the new regulations going into effect later this year. Speakers at the PHI Protection Network Forum 2013 offered health IT leaders some strategies for pitching the C-suite for more budgetary support to ramp up investments for the Sept. 23 HIPAA omnibus rule compliance deadline. Among their tips: Don't focus on financials. Patient care and the overall mission statement of the hospital puts revenue lower on the totem pole than it would be in, for example, a financial institution. Focus on how privacy and security investments will improve patient care and build trust between the community and your organization. "If ...
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
Penn Medicine considers best practices for implementing and managing mobile devices, specifically BYOD devices, in this case study.
With stage 2 meaningful use approaching and the launch of the HIPAA omnibus rule, providers have to ensure their EHR adoption strategies are in place.
Selling senior leadership on HIPAA compliance and patient privacy investments is difficult; here are tips to help outline the business case.
News in this issue
Special interest group formed by NFC Forum sees potential in widespread mHealth uses for new tech embedded in smartphones.
Columns in this issue
The HIPAA omnibus will become official this fall. Is your organization prepared to handle data breaches, BYOD policies and network security?