HIPAA

During the HIPAA Technology Audit our trained technicians will review your existing policies and procedures, assess the technologies you currently have in place and provide a thorough report of our findings. Our audit deliverables will provide you with the proper recommendations to ensure you are HIPAA, FIPA, and HITECH compliant.

Our HIPAA Technology Audit Includes:

  • Onsite Analysis of Existing Policies & Systems in Place
  • Thorough Analysis and Deliverables Reporting our Findings
  • Implementation Plan to Ensure Compliance

 

Poseidon Computer engineers evaluate healthcare practice IT infrastructure based on industry standards:

  • HIPAA Compliance: Provide quarterly network security scans to meet compliance standards and conduct annual HIPAA compliance security risk analysis to eliminate any new vulnerabilities.
  • Network Security: Conduct frequent vulnerability assessments and penetration testing. For example, this is used to determine if it’s appropriate for the practice to maintain their own servers or remove patient data from the practice premises in preparation for electronic health records (EHR). Also, to ensure encryption for all data on portable devices.
  • Interoperability: Make sure that the practice management software is compatible with the IT systems platform. Choose the correct infrastructure suitable for the types of software you want to use for practice management, EHR, medical devices, etc.

HIPAA Privacy Compliance. The HIPAA Privacy Rule, effective April 14, 2003, established national standards to guard the privacy of a patient’s protected health information. Protected health information includes:

• Information created or received by a health care provider or health plan that includes health information or health care payment information plus information that personally identifies the individual patient or plan member.
• Personal identifiers include: a patient’s name and email, website and home addresses; identifying numbers (including Social Security, medical records, insurance numbers, biomedical devices, vehicle identifiers and license numbers); full facial photos and other biometric identifiers; and dates (such as birth date, dates of admission and discharge, death).
HIPAA Security Compliance. The HIPAA Security Rule requires that workforce members adhere to controls and safeguards to (1) ensure the confidentiality, integrity and availability of confidential information; and (2) detect and prevent reasonably anticipated errors and threats due to malicious or criminal actions, system failure, natural disasters and employee or user error. Such events could result in damage to or loss of personal information, corruption or loss of data integrity, or compromise to the privacy of patients or employees and its records.

Privacy and Confidentiality
Poseidon Computer is committed to protecting the medical, personal, and sensitive information about its patients. In health care, the doctor-patient relationship is built on trust and confidentiality; we wanted to keep a good trust between computer supports-Doctors. This trust is essential to provide excellent services to clients. While privacy and confidentiality have always been a priority for health care providers, it has heightened importance in this era of electronic information, with the increased speed of information flow and the risks associated with protecting this information.