{"id":608,"date":"2018-04-09T09:39:39","date_gmt":"2018-04-09T13:39:39","guid":{"rendered":"http:\/\/192.168.157.126\/?page_id=608"},"modified":"2019-04-09T07:43:34","modified_gmt":"2019-04-09T11:43:34","slug":"hipaa-compliance","status":"publish","type":"page","link":"http:\/\/192.168.157.126\/index.php\/landing-pages\/hipaa-compliance\/","title":{"rendered":"HIPAA Compliance"},"content":{"rendered":"
\"\"Are YOU HIPAA Compliant???<\/h5>\n

Tech Tonics can evaluate your entire system to see whether or not you are in compliance.\u00a0 In addition to hardware and software requirements there are also day-to-day human activities that need to be assessed in order to determine if you are in compliance.\u00a0 We have the knowledge to not only make sure your components are in order but the know-how to educate you and your staff on best practices around the office.<\/p>\n

Did you know HIPAA violations<\/strong> can be really expensive<\/strong>?\u00a0 The violation cost can range anywhere from $100 to $50,000 per violation and could cost a business up to $1.5 million in a year!<\/strong>\u00a0 There can also be criminal charges resulting in jail time.<\/p>\n

Is it worth it?\u00a0 Don’t take any more chances – Call us at 215-645-2488 to setup a free evaluation of your current IT systems and to see whether or not we would be a good fit for your practice.<\/strong><\/p>\n

Click HERE<\/a> to see a recent blog post about an office in dire need of help getting their office on track to being HIPAA compliant.<\/h5>\n
<\/h5>\n
<\/h5>\n
What is HIPAA Compliance?<\/h5>\n

HIPAA, the Health Insurance Portability and Accountability Act<\/strong>, sets the standard for protecting sensitive patient data. Any company that deals with protected health information (PHI) must ensure that all the required physical, network, and process security measures are in place and followed.<\/p>\n

This includes covered entities (CE)<\/strong>, anyone who provides treatment, payment and operations in healthcare, and business associates (BA)<\/strong>, anyone with access to patient information and provides support in treatment, payment or operations. Subcontractors, or business associates of business associates, must also be in compliance.<\/p>\n

The HIPAA Privacy Rule<\/strong> addresses the saving, accessing and sharing of medical and personal information of any individual, while the HIPAA Security Rule<\/strong> more specifically outlines national security standards to protect health data created, received, maintained or transmitted electronically, also known as electronic protected health information (ePHI).<\/p>\n

If you are hosting your data with a HIPAA compliant hosting provider, they must have certain administrative, physical and technical safeguards in place, according to the U.S. Department of Health and Human Services. The physical and technical safeguards are most relevant to services provided by your HIPAA compliant host as listed below, with detail on what constitutes a HIPAA compliant data center.<\/p>\n