Five steps to protect your organization from HIPAA audits.

نویسنده

  • Neda Mirafzali
چکیده

An audit begins with a notification letter requesting evidence of a covered entity’s HIPAA privacy and security compliance efforts. Thirty to 90 days following receipt of the requested information, KPMG will conduct an on-site visit. The on-site visit will include interviews with the entity’s leadership, examination of the physical space and operations, review of consistency of the entity’s practice with its stated policies and observation of the entity’s compliance with the HIPAA rules.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Audit-privilege laws: the right to know nothing?

In theory, environmental audit-privilege laws grant immunity to companies that uncover environmental problems during self-audits and that take steps to correct them so that information gleaned from such audits cannot be used against the company in a lawsuit. Supporters of audit-privilege laws believe these laws encourage more audits and more disclosures of regulatory violations because of the g...

متن کامل

Developing a Comprehensive Database Management System for Organization and Evaluation of Mammography Datasets

We aimed to design and develop a comprehensive mammography database system (CMDB) to collect clinical datasets for outcome assessment and development of decision support tools. A Health Insurance Portability and Accountability Act (HIPAA) compliant CMDB was created to store multi-relational datasets of demographic risk factors and mammogram results using the Breast Imaging Reporting and Data Sy...

متن کامل

Are You Ready for a HIPAA Audit?

Title XIII of the American Recovery and Reinvestment Act of 2009 (ARRA) includes the subsection known as the Health Information Technology for Economic and Clinical Health (HITECH) Act. In addition to its incentives for health care organizations to adopt electronic health records (EHRs), HITECH extended the scope of the HIPAA Privacy Rule and the Security Rule, increased penalties for failing t...

متن کامل

Using lessons from health care to protect the privacy of library users: Guidelines for the de-identification of library data based on HIPAA

While libraries have employed policies to protect the data about use of their services, these policies are rarely specific or standardized. Since 1996 the U.S. healthcare system has been grappling with the Health Insurance Portability and Accountability Act (HIPAA), which is designed to provide those handling personal health information with standardized, definitive instructions as to the prote...

متن کامل

The effects of the Health Insurance Portability and Accountability Act privacy rule on influenza research using geographical information systems.

The Health Insurance Portability and Accountability Act (HIPAA) privacy rule was enacted to protect patients' personal health information from undue disclosure. Despite its intention to protect patients, recent reports suggest that HIPAA restrictions may be negatively impacting health research. Quantitative, visual geographical and statistical analysis of zip code geographical information syste...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Behavioral healthcare

دوره 32 6  شماره 

صفحات  -

تاریخ انتشار 2012