BlogPosts

Category:
It's Friday - a good day to check your alarm logs!
It's Friday - a good day to check your alarm logs!Many offices give a key and alarm code to employees so they can open and close the office.  Contact your alarm company and ask them to send you the "alarm logs"   Most systems record 90 to 180 days of history. The alarm logs will show if an employee...  Read More
Insider Threat – A Growing Concern in the Healthcare Sector
As a healthcare provider, do you conduct a pre-employment background check on all potential new hires? Do you routinely conduct periodic background checks for the current workforce? If the answer to either of these questions is “no,” you may want to reconsider and implement a...  Read More
Consultant Tip: Office Computer Security
Office Computer SecurityIn order to secure the practice computer system and its resources, each person is assigned a unique and confidential user name and passcode for accessing the office software. A username defines a particular person who uses the software program. This information is...  Read More
HIPAA Security Audits to Ramp Up in Fall 2014
I have been preaching for a while now that it would only be a matter of time before stepped-up enforcement by the government for the HIPAA Security Rule would begin. Well, it appears that time may be coming this fall.In a recent article in Health IT Security, a spokesman for the U.S. Department of...  Read More
HIPAA Security Compliance: What is Your Sanction Policy?
Sanction policy? It sounds like what one country would do to another country to apply political pressure. Regrettably, that is the terminology the government is using when it comes to this section of HIPAA Security Rule compliance. The sanction policy (CFR 164.308(a)(1)(iii)(C) must be part of the...  Read More
HHS Office of Civil Rights Seeking Public Comment on HIPAA Audit Program
On February 24, 2014, the Office of the Secretary, Department of Health and Human Services (HHS), announced plans to submit a new Information Collection Request (ICR) to the Office of Management and Budget (OMB) for public comment on the HIPAA Audit Program.This information collection consists of a...  Read More
HIPAA Security Factoid
Accordingto the U.S. Department of Health and Human Services, 40% of reported healthcare data breaches involve a lost or stolen laptop or mobile device. Make sure all your portable devices,tablets, thumb drives, and external hard drives that containpatient records haveproper encryption safeguards...  Read More
Top 10 Myths of HIPAA Risk Analysis
The following is a top 10 list distinguishing fact from fiction when it comes to conducting A HIPAA Security Risk Analysis.1. The security risk analysis is optional for small providers.False. All providers who are “covered entities” under HIPAA are required to perform a risk analysis....  Read More

Total Blog Activity

754
Total Bloggers
8,129
Total Blog Posts
2,826
Total Podcasts
1,259
Total Videos

Sponsors

Townie Perks

Townie® Poll

What do you use to take routine X-rays?


  

Site Help

Sally Gross, Member Services
Phone: +1-480-445-9710
Email: sally@farranmedia.com

Follow Dentaltown

Mobile App

WITH DENTALTOWN . . . NO DENTIST WILL EVER HAVE TO PRACTICE SOLO AGAIN®

WWW.DENTALTOWN.COM - WHERE THE DENTAL COMMUNITY LIVES®

9633 S. 48th Street Suite 200 • Phoenix, AZ 85044 · Phone: +1-480-598-0001 · Fax: +1-480-598-3450
©1999-2019 Dentaltown, L.L.C., a division of Farran Media, L.L.C. · All Rights Reserved