We are pleased to announce a new webinar from a new addition to the ISI team. ISI’s Microsoft Practice, Director, Tony Rosselli, will present the webinar, How People-based Analytics is Transforming the Way Business Line Managers Make Organizational Decisions. The webinar takes place on Thursday, October 6 at 11 am CST, and registration is now open.
Darlene Jackson is a published writer with many years of experience in digital publishing, advertising, and public relations. Her diverse assignments include stints with Chicago Public Media, The Chicago Tribune, and various print and online media and communication outlets. She is currently pursuing a master's degree at Northwestern University.
ISI is pleased to announce a new webinar from Mark McNeill, Vice President of Enterprise & Healthcare UC Solutions. The webinar, Collaboration, Communications & the Increased Risk of HIPAA Privacy Breaches, focuses on how sudden changes in modes of communication are contributing to HIPAA non-compliance in healthcare and what companies can and must do to avoid violations. The webinar takes place on Tuesday, October 4 at 11 am CST and registration is now open.
When choosing which Unified Communications (UC) solutions your business needs, consideration might be given to what types of analytics might come from your chosen platform. Knowing what business intelligence will assist in your company’s success could also determine the purchase. Both Cisco and Microsoft are leaders in the field for different reasons and have different strengths. When a company is deciding which system to go with it must consider the collaboration and communication needs of its employees, so that the acquisition is based on real usage statistics and not corporate planning alone. Money spent on solutions that go unused is money wasted. For either solution to succeed, it must not only align with the business objectives but place user interactivity into that equation.
It was in 1996 that the Health Insurance Portability and Accountability Act (HIPAA) was passed by Congress to become law. Long since its passing, covered entities such as healthcare providers, plans, and data warehouses, etc. are still in the midst of trying to achieve full compliance. Fines and complaints continue to mount so why is full HIPAA compliance so elusive even 20 years later? Moreover, how can Unified Communications (UC) help?
Mobility can upset the ideal HIPAA environment. Our mobile devices, including laptops, smartphones, and tablets can cause breaches through carelessness such as loss and more sinister interactions of theft. Leaving mobile devices around unencrypted and containing protected health information (PHI) makes HIPAA violations possible and are the primary cause of breach.
Without knowing it, use of social media apps in the healthcare environment can be an easy set up for a HIPAA violation. Photographs and videos taken in or outside of a hospital that end up on Snapchat, Facebook, or even Pokémon Go, for instance, can expose and identify the PHI of a patient. Take the time to develop a social media policy for compliance.
FAILING TO REVIEW
Covered Entities need to vigorously review their HIPAA compliance measures to assess risks. Routine risk analysis is crucial (and a HIPAA compliance mandate) to evaluate new technologies brought into the healthcare setting and realize any vulnerabilities in network systems and workflows. Regular and automatic security upgrades to network devices are necessary to maintain compliance as well. Verify the safeguards are in place and demonstrate their ability to reduce risks.
Mandatory training in HIPAA compliance is an ongoing measure entities must undertake. Remember to keep your team up to date on how to maintain compliance during onboarding and plan regular reviews....
Unless your business is a new startup, your technology is more than likely based on the something old, something new, and maybe even something borrowed philosophy. Phones that came on premises years ago are sitting quietly on their desks as mobile phone usage rises, taking their place. The investment in all that infrastructure is hard to let go, even if the majority of the workplace is not inclined to use what remains. Some workers even opt to bring in their own tablet or laptop because it’s newer and more modern than the one provided for them by the company. Replacing legacy equipment for more advanced tech is a risky and costly choice and one many company’s dread when the time comes.