preview

HIPAA Best Practices

Better Essays

Any best practices in a healthcare system setting begins with following the rules and guidelines of the Health Insurance Portability and Accountability Act (HIPAA) Enacted in 1966, HIPAA introduced guidelines governing privacy and security of all protected health information (PHI) and protected health information created electronically. While some HIPAA rules have been enforced rigorously than others, the 2009 Health Information Technology for Economic and Clinical Health Act (HITECH) has detailed significantly more rigid requirements. In addition to requiring much more significant use of health information technology, such as electronic medical records (EMR), HITECH encompasses provisions that reinforce the civil and criminal execution of …show more content…

Hospitals have put in place widespread security and privacy measures to protect patient health information. However, there are still errors being made in data security through the IT standpoint. Some of these errors or issues include: • The mindset that data security is only an IT issue - Some hospital management only engage in data security after they see the financial and public relations impact of a data breach made on another healthcare organization • Not protecting data integrity and when it is available - any healthcare institution should realize that it is necessary to protect healthcare data's confidentiality and that protecting the integrity and availability of the data is also important. • Poor data storage protection - need to understand where healthcare data exists when it is created, used, stored and communicated. When healthcare data flows inside and outside of a hospital to healthcare professionals, pharmacists and specialists it is easy to overlook where the data might end …show more content…

Automation and interconnections with information in their healthcare environments need increasing support, security measures need to be implemented without disrupting the workflow of approved users, costs associated with data breaches and damage to their reputation need to be avoided. IT budgets constraints also impose limitations in many healthcare institutions. Compliance with security and privacy related regulations in healthcare and making sure what policies and standards should be implemented requires solutions that clearly address security challenges so that they can be integrated into a healthcare institution’s existing infrastructure and business practice. As data is transmitted across countless environments and is stored on an ever-expanding grouping of endpoint and storage devices such as computers, laptops, and removable storage devices, it will become evident that there will be a need for strong encryption. Under the HITECH Act and comparable state laws, encrypted data that is received or acquired by unauthorized persons through a lost or stolen electronic device or an errant email, is typically not considered a breach. However, healthcare institutions need to determine the level of encryption they should adopt. For example, a hospital could decide where there is the greatest risk of information loss (patient data in email messages or on storage drive) that is not on internal

Get Access