Subject: | |
From: | |
Reply To: | |
Date: | Thu, 26 Mar 2015 08:22:06 -0700 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
http://www.mondaq.com/article.asp?articleid=383916&email_access=on
"The (original, not this) article points out that there are many
complexities involved in the ownership, custody, creation, access, use,
maintenance, transmission and retention of PHI. It may not be possible to
prevent hacking or theft of PHI, even with reasonable security and privacy
policies and procedures in place that are being followed. However, if a
breach or other adverse event occurs, the covered entity or business
associate will be well-served by being able to demonstrate that it had and
followed such policies and procedures if and when a regulatory authority or
court is reviewing a HIPAA violation and determining potential
responsibility and liability"
--
Larry
[log in to unmask]
*----Lawrence J. MedinaDanville, CARIM Professional since 1972*
List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]
|
|
|