Hipaa Article Review And Evaluation

1331 Words6 Pages
HIPAA Article Review and Evaluation Ashlie McWee HCM 515: Health Law and Ethics Colorado State University-Global Campus Dr. Trellany Thomas-Evans February 28, 2016 HIPAA Article Review and Evaluation Healthcare technology has grown and evolved over time. With the conversion to electronic medical records and the creation of social media just to name a few, ensuring patient privacy is of the utmost importance for healthcare facilities in this day and age. In order for an organization to avoid hefty fines, it is imperative that a healthcare administrator maintains compliance with the standards and regulations associated with the Health Insurance Portability and Accountability Act (HIPAA). This paper will provide a summary…show more content…
Under the HIPAA compliance audit program if a healthcare organization has attested and is later audited and found not to be compliant with HIPAA, the organization could face penalties including giving back the meaningful use incentive money. (Goedert, 2013) provided the following ways to ensure compliance: conduct mock audits, make sure all data within the organization is encrypted, computer access is logged, network security gaps have been filled, policies and regulations have been updated and expanded, and most importantly that all staff complete annual HIPAA training courses with emphasis on privacy and security. How Health Care Data Security Rules May Affect You (Dietrich, 2015), discussed that new regulations have caused many Certified Public Accountants (CPAs) to become subject to patient health care data security rules under HIPAA. When providing consulting services to a healthcare organization or assisting with revenue cycle, CPAs should try to limit their liability by minimizing exposure to health care data and establish an engagement letter to ensure the healthcare organization is liable if patient health care data is unnecessarily provided to the CPA. Under HIPAA, electronic information must be protected during electronic exchange, technically protected against unauthorized access, and physically protected against unauthorized access
Open Document