Access your Pro+ Content below.
HIPAA omnibus rule and stage 2 test organizational compliance
This article is part of the Pulse issue of May 2013
The words "meaningful" and "use" are undoubtedly on the lips of many a CIO as 2014 approaches and brings with it stage 2 of the federal EHR incentive programs, and especially in light of the recent omnibus HIPAA privacy and security rule. Final requirements outlining criteria for the certification of EHR technology for stage 2 meaningful use were published in September 2012. Meaningful use under the stage 1 criteria, which focused on data capturing and sharing in 2011 and 2012, must have been achieved before providers can move on to stage 2. Among the stage 2 criteria is specific detail about data encryption required for EHR certification. Core measure 7 of the stage 2 eligible hospital and critical access hospital (CAH) measures outlines several key areas: Conduct or review a security risk analysis in accordance with the requirements under 45 CFR 164.308(a)(1), including addressing the encryption/security of data stored in [certified EHR technology] CEHRT in accordance with requirements under 45 CFR 164.312 (a)(2)(iv) and 45 ...
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
Penn Medicine considers best practices for implementing and managing mobile devices, specifically BYOD devices, in this case study.
With stage 2 meaningful use approaching and the launch of the HIPAA omnibus rule, providers have to ensure their EHR adoption strategies are in place.
Selling senior leadership on HIPAA compliance and patient privacy investments is difficult; here are tips to help outline the business case.
News in this issue
Special interest group formed by NFC Forum sees potential in widespread mHealth uses for new tech embedded in smartphones.
Columns in this issue
The HIPAA omnibus will become official this fall. Is your organization prepared to handle data breaches, BYOD policies and network security?