SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
HIPAA VIOLATIONS
HOW THEY HAPPEN; WHAT THEY COST
$4,800,000
A lack of “technical
safeguards” caused
ePHI to become
searchable on the
internet when a
physician tried to
deactivate a
personally-owned
computer server
from the network.
$1,975,220
The theft of an
unencrypted laptop
led to a wider
investigation that
discovered the
provider was aware
of the “critical risk” of
unencrypted laptops,
desktops, tablets and
other devices, but did
not mitigate that risk.
$1,700,000
Among other
violations, the
provider failed to
have “technical
safeguards” in place
to verify the identity
of the individual
seeking access to
ePHI.
$1,700,000
A portable
electronic storage
device “possibly”
containing ePHI was
stolen from a user’s
vehicle, initiating a
wider investigation.
$1,500,000
A total of 57
unencrypted
computers
were stolen
from a provider’s
leased facility.
PHYSICAL
THEFT OF
ELECTRONIC
EQUIPMENT
WITH
UNPROTECTED
DATA
(disc drives,
desktops, laptops,
and smartphones not
encrypted and/or not
password-protected)
%
88INVOLVE ELECTRONIC
PROTECTED HEALTH
INFORMATION
(ePHI)
UNAUTHORIZED ACCESS/
DISCLOSURE
PHYSICAL LOSS
OF ELECTRONIC
EQUIPMENT
(not encrypted
and/or not
password-protected)
OTHER
COMBINATION
49%
16%
14%
12%
9%
Examples of recent provider settlements with HHS’s Office of Civil Rights because of HIPAA breaches of ePHI:
HOW THEY HAPPEN
WHAT THEY COST
(including not encrypted and/or not
password-protected electronic equipment)
HOW TO PROTECT YOURSELF
COLLECT AND ORGANIZE KEY DOCUMENTS
ENCRYPT EVERYTHING, NOT JUST THE DATA STORED ON SERVERS
MAKE SECURITY A PRIORITY, SYSTEM-WIDE
KEEP YOUR POLICIES UP TO DATE
ESTABLISH AND DOCUMENT TRAINING AND TESTING REGIMENS
ESTABLISH A DISASTER RECOVERY PLAN
CONDUCT ROUTINE SELF-AUDITS
REVIEW THE COMPLETE OCR HIPAA AUDIT PROTOCOL REGULARLY
www.hhs.gov/ocr/privacy/hipaa/enforcement/audit/protocol.html
DOWNLOAD THE FULL HIPAA COMPLIANCE CHECKLIST
www.diagnotes.com/hipaa-compliance-checklist
Diagnotes® is a HIPAA-compliant communication platform that helps healthcare
organizations improve communication among providers, patients and staff. To learn more
about how Diagnotes can help solve your communication challenges, visit our website
at www.diagnotes.com or call 317-395-7080.
116,000+

Weitere ähnliche Inhalte

Was ist angesagt?

Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five yearsSABBY GILL
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystemrahulbindra
 
Cyber crime
Cyber crimeCyber crime
Cyber crimeAkhil Ak
 
Cyber Security - ICCT Colleges
Cyber Security - ICCT CollegesCyber Security - ICCT Colleges
Cyber Security - ICCT CollegesPotato
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Internet of Things Security Risks for Businesses
Internet of Things Security Risks for BusinessesInternet of Things Security Risks for Businesses
Internet of Things Security Risks for BusinessesMike Ryan
 
Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Skills Academy
 
Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhanAhmed Sleem
 
IoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructuresIoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructuresUITSEC Teknoloji A.Ş.
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGJyotisheklingji
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyPELUMI APANTAKU
 
IoT Security Middleware: evaluating the threats and protecting against them
 IoT Security Middleware: evaluating the threats and protecting against them IoT Security Middleware: evaluating the threats and protecting against them
IoT Security Middleware: evaluating the threats and protecting against themNick Allott
 
6. mobile security (cyber awareness series)
6. mobile security (cyber awareness series)6. mobile security (cyber awareness series)
6. mobile security (cyber awareness series)Isaac Feliciano
 
Application of security computer
Application of security computerApplication of security computer
Application of security computeribrahimzubairu2003
 

Was ist angesagt? (20)

Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystem
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security - ICCT Colleges
Cyber Security - ICCT CollegesCyber Security - ICCT Colleges
Cyber Security - ICCT Colleges
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Internet of Things Security Risks for Businesses
Internet of Things Security Risks for BusinessesInternet of Things Security Risks for Businesses
Internet of Things Security Risks for Businesses
 
Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhan
 
IoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructuresIoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructures
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
 
IoT Security Middleware: evaluating the threats and protecting against them
 IoT Security Middleware: evaluating the threats and protecting against them IoT Security Middleware: evaluating the threats and protecting against them
IoT Security Middleware: evaluating the threats and protecting against them
 
6. mobile security (cyber awareness series)
6. mobile security (cyber awareness series)6. mobile security (cyber awareness series)
6. mobile security (cyber awareness series)
 
Application of security computer
Application of security computerApplication of security computer
Application of security computer
 
needforsecurity
needforsecurityneedforsecurity
needforsecurity
 

Ähnlich wie Hipaa violations-infographic-one-page (2)

Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1anilinvns
 
Sheet0Name of Covered EntityStateCovered Entity TypeIndividuals Af.docx
Sheet0Name of Covered EntityStateCovered Entity TypeIndividuals Af.docxSheet0Name of Covered EntityStateCovered Entity TypeIndividuals Af.docx
Sheet0Name of Covered EntityStateCovered Entity TypeIndividuals Af.docxbagotjesusa
 
What Data Are You Leaking? BSidesLV Presentation
What Data Are You Leaking? BSidesLV Presentation What Data Are You Leaking? BSidesLV Presentation
What Data Are You Leaking? BSidesLV Presentation keyalea
 
Information Security
Information SecurityInformation Security
Information Securitysteffiann88
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016dilahkmpk
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia LunaAviva Spectrum™
 
Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy ARYAS87
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentcparimala
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
$4.8m HIPAA Breach
$4.8m HIPAA Breach$4.8m HIPAA Breach
$4.8m HIPAA BreachInfinisource
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security ProtectionShawn Crimson
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesGFI Software
 
Warrantless governmental surveillance through the use of emerging technology ...
Warrantless governmental surveillance through the use of emerging technology ...Warrantless governmental surveillance through the use of emerging technology ...
Warrantless governmental surveillance through the use of emerging technology ...Vania_Chaker
 

Ähnlich wie Hipaa violations-infographic-one-page (2) (20)

Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
Sheet0Name of Covered EntityStateCovered Entity TypeIndividuals Af.docx
Sheet0Name of Covered EntityStateCovered Entity TypeIndividuals Af.docxSheet0Name of Covered EntityStateCovered Entity TypeIndividuals Af.docx
Sheet0Name of Covered EntityStateCovered Entity TypeIndividuals Af.docx
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 
9 ethics in it space
9 ethics in it space9 ethics in it space
9 ethics in it space
 
What Data Are You Leaking? BSidesLV Presentation
What Data Are You Leaking? BSidesLV Presentation What Data Are You Leaking? BSidesLV Presentation
What Data Are You Leaking? BSidesLV Presentation
 
Information Security
Information SecurityInformation Security
Information Security
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
$4.8m HIPAA Breach
$4.8m HIPAA Breach$4.8m HIPAA Breach
$4.8m HIPAA Breach
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Hacking
Hacking Hacking
Hacking
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Warrantless governmental surveillance through the use of emerging technology ...
Warrantless governmental surveillance through the use of emerging technology ...Warrantless governmental surveillance through the use of emerging technology ...
Warrantless governmental surveillance through the use of emerging technology ...
 

Kürzlich hochgeladen

Call Girl Service ITPL - [ Cash on Delivery ] Contact 7001305949 Escorts Service
Call Girl Service ITPL - [ Cash on Delivery ] Contact 7001305949 Escorts ServiceCall Girl Service ITPL - [ Cash on Delivery ] Contact 7001305949 Escorts Service
Call Girl Service ITPL - [ Cash on Delivery ] Contact 7001305949 Escorts Servicenarwatsonia7
 
Russian Escorts Service Delhi 9711199171 SONI VIP & HOT BOOK NOW
Russian Escorts Service Delhi 9711199171 SONI VIP & HOT BOOK NOWRussian Escorts Service Delhi 9711199171 SONI VIP & HOT BOOK NOW
Russian Escorts Service Delhi 9711199171 SONI VIP & HOT BOOK NOWsangeevkumar5478
 
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service MumbaiCollege Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbaisonalikaur4
 
2024 HCAT Healthcare Technology Insights
2024 HCAT Healthcare Technology Insights2024 HCAT Healthcare Technology Insights
2024 HCAT Healthcare Technology InsightsHealth Catalyst
 
Biology class 12 assignment neet level practise chapter wise
Biology class 12 assignment neet level practise chapter wiseBiology class 12 assignment neet level practise chapter wise
Biology class 12 assignment neet level practise chapter wiseNAGKINGRAPELLY
 
Rohini Sector 6 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few Cl...
Rohini Sector 6 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few Cl...Rohini Sector 6 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few Cl...
Rohini Sector 6 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few Cl...ddev2574
 
FAMILY in sociology for physiotherapists.pptx
FAMILY in sociology for physiotherapists.pptxFAMILY in sociology for physiotherapists.pptx
FAMILY in sociology for physiotherapists.pptxMumux Mirani
 
Call Girls Service Bommasandra - Call 7001305949 Rs-3500 with A/C Room Cash o...
Call Girls Service Bommasandra - Call 7001305949 Rs-3500 with A/C Room Cash o...Call Girls Service Bommasandra - Call 7001305949 Rs-3500 with A/C Room Cash o...
Call Girls Service Bommasandra - Call 7001305949 Rs-3500 with A/C Room Cash o...narwatsonia7
 
EMS and Extrication: Coordinating Critical Care
EMS and Extrication: Coordinating Critical CareEMS and Extrication: Coordinating Critical Care
EMS and Extrication: Coordinating Critical CareRommie Duckworth
 
Call Girls Sawda 9999965857 Cheap and Best with original Photos
Call Girls Sawda 9999965857 Cheap and Best with original PhotosCall Girls Sawda 9999965857 Cheap and Best with original Photos
Call Girls Sawda 9999965857 Cheap and Best with original Photoskartikkumark7k7
 
Low Vision Case (Nisreen mokhanawala).pptx
Low Vision Case (Nisreen mokhanawala).pptxLow Vision Case (Nisreen mokhanawala).pptx
Low Vision Case (Nisreen mokhanawala).pptxShubham
 
Call Girls Dwarka 9999965857 Cheap & Best with original Photos
Call Girls Dwarka 9999965857 Cheap & Best with original PhotosCall Girls Dwarka 9999965857 Cheap & Best with original Photos
Call Girls Dwarka 9999965857 Cheap & Best with original Photosparshadkalavatidevi7
 
Soft Toric contact lens fitting (NSO).pptx
Soft Toric contact lens fitting (NSO).pptxSoft Toric contact lens fitting (NSO).pptx
Soft Toric contact lens fitting (NSO).pptxJasmin Modi
 
Single Assessment Framework - What We Know So Far
Single Assessment Framework - What We Know So FarSingle Assessment Framework - What We Know So Far
Single Assessment Framework - What We Know So FarCareLineLive
 
Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...ggsonu500
 
Gurgaon Sector 68 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 68 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...Gurgaon Sector 68 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 68 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...ggsonu500
 
Russian Call Girl Chandapura Dommasandra Road - 7001305949 Escorts Service 50...
Russian Call Girl Chandapura Dommasandra Road - 7001305949 Escorts Service 50...Russian Call Girl Chandapura Dommasandra Road - 7001305949 Escorts Service 50...
Russian Call Girl Chandapura Dommasandra Road - 7001305949 Escorts Service 50...narwatsonia7
 
Call Girls Ghaziabad 9999965857 Cheap and Best with original Photos
Call Girls Ghaziabad 9999965857 Cheap and Best with original PhotosCall Girls Ghaziabad 9999965857 Cheap and Best with original Photos
Call Girls Ghaziabad 9999965857 Cheap and Best with original Photosparshadkalavatidevi7
 
Call Girl Bangalore Aashi 7001305949 Independent Escort Service Bangalore
Call Girl Bangalore Aashi 7001305949 Independent Escort Service BangaloreCall Girl Bangalore Aashi 7001305949 Independent Escort Service Bangalore
Call Girl Bangalore Aashi 7001305949 Independent Escort Service Bangalorenarwatsonia7
 

Kürzlich hochgeladen (20)

Call Girl Service ITPL - [ Cash on Delivery ] Contact 7001305949 Escorts Service
Call Girl Service ITPL - [ Cash on Delivery ] Contact 7001305949 Escorts ServiceCall Girl Service ITPL - [ Cash on Delivery ] Contact 7001305949 Escorts Service
Call Girl Service ITPL - [ Cash on Delivery ] Contact 7001305949 Escorts Service
 
Russian Call Girls South Delhi 9711199171 discount on your booking
Russian Call Girls South Delhi 9711199171 discount on your bookingRussian Call Girls South Delhi 9711199171 discount on your booking
Russian Call Girls South Delhi 9711199171 discount on your booking
 
Russian Escorts Service Delhi 9711199171 SONI VIP & HOT BOOK NOW
Russian Escorts Service Delhi 9711199171 SONI VIP & HOT BOOK NOWRussian Escorts Service Delhi 9711199171 SONI VIP & HOT BOOK NOW
Russian Escorts Service Delhi 9711199171 SONI VIP & HOT BOOK NOW
 
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service MumbaiCollege Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
 
2024 HCAT Healthcare Technology Insights
2024 HCAT Healthcare Technology Insights2024 HCAT Healthcare Technology Insights
2024 HCAT Healthcare Technology Insights
 
Biology class 12 assignment neet level practise chapter wise
Biology class 12 assignment neet level practise chapter wiseBiology class 12 assignment neet level practise chapter wise
Biology class 12 assignment neet level practise chapter wise
 
Rohini Sector 6 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few Cl...
Rohini Sector 6 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few Cl...Rohini Sector 6 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few Cl...
Rohini Sector 6 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few Cl...
 
FAMILY in sociology for physiotherapists.pptx
FAMILY in sociology for physiotherapists.pptxFAMILY in sociology for physiotherapists.pptx
FAMILY in sociology for physiotherapists.pptx
 
Call Girls Service Bommasandra - Call 7001305949 Rs-3500 with A/C Room Cash o...
Call Girls Service Bommasandra - Call 7001305949 Rs-3500 with A/C Room Cash o...Call Girls Service Bommasandra - Call 7001305949 Rs-3500 with A/C Room Cash o...
Call Girls Service Bommasandra - Call 7001305949 Rs-3500 with A/C Room Cash o...
 
EMS and Extrication: Coordinating Critical Care
EMS and Extrication: Coordinating Critical CareEMS and Extrication: Coordinating Critical Care
EMS and Extrication: Coordinating Critical Care
 
Call Girls Sawda 9999965857 Cheap and Best with original Photos
Call Girls Sawda 9999965857 Cheap and Best with original PhotosCall Girls Sawda 9999965857 Cheap and Best with original Photos
Call Girls Sawda 9999965857 Cheap and Best with original Photos
 
Low Vision Case (Nisreen mokhanawala).pptx
Low Vision Case (Nisreen mokhanawala).pptxLow Vision Case (Nisreen mokhanawala).pptx
Low Vision Case (Nisreen mokhanawala).pptx
 
Call Girls Dwarka 9999965857 Cheap & Best with original Photos
Call Girls Dwarka 9999965857 Cheap & Best with original PhotosCall Girls Dwarka 9999965857 Cheap & Best with original Photos
Call Girls Dwarka 9999965857 Cheap & Best with original Photos
 
Soft Toric contact lens fitting (NSO).pptx
Soft Toric contact lens fitting (NSO).pptxSoft Toric contact lens fitting (NSO).pptx
Soft Toric contact lens fitting (NSO).pptx
 
Single Assessment Framework - What We Know So Far
Single Assessment Framework - What We Know So FarSingle Assessment Framework - What We Know So Far
Single Assessment Framework - What We Know So Far
 
Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 90 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
 
Gurgaon Sector 68 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 68 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...Gurgaon Sector 68 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 68 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
 
Russian Call Girl Chandapura Dommasandra Road - 7001305949 Escorts Service 50...
Russian Call Girl Chandapura Dommasandra Road - 7001305949 Escorts Service 50...Russian Call Girl Chandapura Dommasandra Road - 7001305949 Escorts Service 50...
Russian Call Girl Chandapura Dommasandra Road - 7001305949 Escorts Service 50...
 
Call Girls Ghaziabad 9999965857 Cheap and Best with original Photos
Call Girls Ghaziabad 9999965857 Cheap and Best with original PhotosCall Girls Ghaziabad 9999965857 Cheap and Best with original Photos
Call Girls Ghaziabad 9999965857 Cheap and Best with original Photos
 
Call Girl Bangalore Aashi 7001305949 Independent Escort Service Bangalore
Call Girl Bangalore Aashi 7001305949 Independent Escort Service BangaloreCall Girl Bangalore Aashi 7001305949 Independent Escort Service Bangalore
Call Girl Bangalore Aashi 7001305949 Independent Escort Service Bangalore
 

Hipaa violations-infographic-one-page (2)

  • 1. HIPAA VIOLATIONS HOW THEY HAPPEN; WHAT THEY COST $4,800,000 A lack of “technical safeguards” caused ePHI to become searchable on the internet when a physician tried to deactivate a personally-owned computer server from the network. $1,975,220 The theft of an unencrypted laptop led to a wider investigation that discovered the provider was aware of the “critical risk” of unencrypted laptops, desktops, tablets and other devices, but did not mitigate that risk. $1,700,000 Among other violations, the provider failed to have “technical safeguards” in place to verify the identity of the individual seeking access to ePHI. $1,700,000 A portable electronic storage device “possibly” containing ePHI was stolen from a user’s vehicle, initiating a wider investigation. $1,500,000 A total of 57 unencrypted computers were stolen from a provider’s leased facility. PHYSICAL THEFT OF ELECTRONIC EQUIPMENT WITH UNPROTECTED DATA (disc drives, desktops, laptops, and smartphones not encrypted and/or not password-protected) % 88INVOLVE ELECTRONIC PROTECTED HEALTH INFORMATION (ePHI) UNAUTHORIZED ACCESS/ DISCLOSURE PHYSICAL LOSS OF ELECTRONIC EQUIPMENT (not encrypted and/or not password-protected) OTHER COMBINATION 49% 16% 14% 12% 9% Examples of recent provider settlements with HHS’s Office of Civil Rights because of HIPAA breaches of ePHI: HOW THEY HAPPEN WHAT THEY COST (including not encrypted and/or not password-protected electronic equipment) HOW TO PROTECT YOURSELF COLLECT AND ORGANIZE KEY DOCUMENTS ENCRYPT EVERYTHING, NOT JUST THE DATA STORED ON SERVERS MAKE SECURITY A PRIORITY, SYSTEM-WIDE KEEP YOUR POLICIES UP TO DATE ESTABLISH AND DOCUMENT TRAINING AND TESTING REGIMENS ESTABLISH A DISASTER RECOVERY PLAN CONDUCT ROUTINE SELF-AUDITS REVIEW THE COMPLETE OCR HIPAA AUDIT PROTOCOL REGULARLY www.hhs.gov/ocr/privacy/hipaa/enforcement/audit/protocol.html DOWNLOAD THE FULL HIPAA COMPLIANCE CHECKLIST www.diagnotes.com/hipaa-compliance-checklist Diagnotes® is a HIPAA-compliant communication platform that helps healthcare organizations improve communication among providers, patients and staff. To learn more about how Diagnotes can help solve your communication challenges, visit our website at www.diagnotes.com or call 317-395-7080. 116,000+