The HHS Releases the HIPAA Security Risk Assessment Tool Conducting your Risk Assessment for HIPAA can seem like a monstrous task, and the template from the ADA HIPAA Compliance Kit is useful, but can seem overwhelming to most dental offices.
Windows XP End of Life
Microsoft is officially ending support for Windows XP on April 8, 2014, less than 90 days from now. This means that Microsoft will stop providing patches, including security updates for its over decade old operating system. While HIPAA laws do
HIPAA Audit Process – Documentation from HHS
HIPAA audits follow a documented protocol to analyze processes, policies, and controls put in place by Covered Entities. Although no two HIPAA audits are exactly the same, the protocol is documented here, at the HHS website. What is the focus of
Patch Management – an Essential Component of HIPAA Compliance
One of the essential services that is needed in a dental office is patch management. From fixing security vulnerabilities to improving performance, patch management keeps all vital network-oriented software up to date, reducing downtime by scheduling patching for off-hours. Benefits
Actual HIPAA Audit Letter Following a Data Breach
Actual HIPAA Audit Letter Following a Data Breach We came across an actual letter sent by the Office of Civil Rights following a data breach. The OCR is responsible for taking action for HIPAA compliance issues and enforcement. This particular
HIPAA Breaches – a Searchable Database
Please follow the link at the bottom of this page in order to search the database. Each breach of HIPAA involving 500 or more pieces of data from patients must be reported to HHS, and to the media. Anything from
HIPAA Consultations – Common Data Security Vulnerabilities
Since last year, dmi Networking has provided HIPAA Consultations as a free service. In our evaluations, we have found several issues which keep popping up, and many have low- or even no-cost fixes. Below, I’ve listed a few things that a dental
HIPAA Checklist Items for Security Rule Compliance
During any thorough HIPAA consultation, you will find that your computer network must meet a minimum set of requirements in order to fully comply with the Security Rule portion of the law. Below, I have outlined a few of these