Video: Every Case Tells a Story| Webinar: ACR/CHEST ILD Guidelines in Practice

An official publication of the ACR and the ARP serving rheumatologists and rheumatology professionals

  • Conditions
    • Axial Spondyloarthritis
    • Gout and Crystalline Arthritis
    • Myositis
    • Osteoarthritis and Bone Disorders
    • Pain Syndromes
    • Pediatric Conditions
    • Psoriatic Arthritis
    • Rheumatoid Arthritis
    • Sjögren’s Disease
    • Systemic Lupus Erythematosus
    • Systemic Sclerosis
    • Vasculitis
    • Other Rheumatic Conditions
  • FocusRheum
    • ANCA-Associated Vasculitis
    • Axial Spondyloarthritis
    • Gout
    • Psoriatic Arthritis
    • Rheumatoid Arthritis
    • Systemic Lupus Erythematosus
  • Guidance
    • Clinical Criteria/Guidelines
    • Ethics
    • Legal Updates
    • Legislation & Advocacy
    • Meeting Reports
      • ACR Convergence
      • Other ACR meetings
      • EULAR/Other
    • Research Rheum
  • Drug Updates
    • Analgesics
    • Biologics/DMARDs
  • Practice Support
    • Billing/Coding
    • EMRs
    • Facility
    • Insurance
    • QA/QI
    • Technology
    • Workforce
  • Opinion
    • Patient Perspective
    • Profiles
    • Rheuminations
      • Video
    • Speak Out Rheum
  • Career
    • ACR ExamRheum
    • Awards
    • Career Development
  • ACR
    • ACR Home
    • ACR Convergence
    • ACR Guidelines
    • Journals
      • ACR Open Rheumatology
      • Arthritis & Rheumatology
      • Arthritis Care & Research
    • From the College
    • Events/CME
    • President’s Perspective
  • Search

Cyber Safety in the HIPAA Age

Richard Quinn  |  January 6, 2017

Ms. Kim agrees that rheumatologists should expect employees to use personal devices. Knowing that, she encourages safeguards around their security and usage.

“Securing mobile and other devices can be a problem,” she says. “Some devices are more secure than others. Make sure mobile phones have anti-virus software, and that you have an automatic lock out [a HIPAA rule].”

ad goes here:advert-1
ADVERTISEMENT
SCROLL TO CONTINUE

Ms. Kim says physician practices should also explore mobile device management software, so that “all the mobile devices in your practice are centrally managed.”

She also warns against application downloads from app stores, some of which contain malware. “Even though some mobile app stores have a screening process for applications, we still hear reports of malware-laden apps getting through,” Kim adds.

ad goes here:advert-2
ADVERTISEMENT
SCROLL TO CONTINUE

5. Use Background Checks to Weed Out Potentially Rogue Staff
Heard this story before? A new staffer uses a handheld credit-card device to steal nearly $50,000 in co-pays from patients. The staffer walked into exam rooms and just asked for the co-pay. No fuss, no muss.

“Turns out, she had been indicted for the same thing in another state,” Dr. Kazi says. “A decent background check would have caught that.”

Although not a solution for all of your staffing needs, background checks and personality tests can be effective.

“I think that is important,” he says. “There are companies that can do personality checks for you. They are easy and very reliable. … It is not a perfect method, but it can reduce your risk.”

6. Educate Employees About Cyber Security & Hold Them Accountable
Dr. Kazi says training a medical staff about cyber security can be difficult, often boring and redundant. However, it is vital, considering the risk to the physician and the practice.

“You really have to have honest discussions with your staff,” he says. “Talk about the negative impact [of security breaches]. Get peoples’ buy-in.”

One area of difficulty new to medicine is social media. Office staff, especially, must abide by strict guidelines with regard to posting or sharing. It seems like common sense, but it happens every day.

“The temptation is too much,” Dr. Kazi says. “You have to make sure [staff] understand that once posted, it is no longer private, even if you only shared with one person. [Safeguarding patient privacy] has to become second nature.”

No matter where your practice is on the cyber security spectrum, Dr. Kazi says your goal should be to strike the right balance in approach, education and systems.

Page: 1 2 3 4 | Single Page
Share: 

Filed under:Information TechnologyPractice SupportTechnologyTechnology Tagged with:cyber securitydatadata managementHealth Information TechnologyHIPAAHIPAA compliancePractice ManagementTechnology

Related Articles

    Cyber Risks: A New Area of Liability for Medical Practices

    December 16, 2015

    Computerization of healthcare in general, and medical records in particular, has opened additional areas of liability for medical practices that many may not be addressing. A data breach of patient records can have major financial and business impacts on the practice when they occur. Data Intrusions Increasing The number of data intrusions hit a record…

    HIPAA and PHI Cybersecurity Best Practices in the COVID-19 Era

    September 14, 2021

    When the first SARS-CoV-2 case was recorded, it was difficult to appreciate the extent to which cybersecurity concerns, particularly in connection to the protection of patient healthcare data, would enter into main­stream consciousness. Although many practices and healthcare organizations have recently adopted additional measures to safeguard patients’ protected health information (PHI) through expanded cybersecurity monitoring,…

    English Hospitals Divert Ambulances After Ransomware Cyber Attack

    May 12, 2017

    LONDON (Reuters)—Hospitals and doctors’ surgeries across England were forced to turn away patients and cancel appointments on Friday after a nationwide ‘ransomware’ cyber attack crippled some computer systems in the state-run health service. The U.K. National Health Service (NHS) said 16 organizations had been affected by the cyber attack but said it had not been…

    Medical Device Safety Concerns Rheumatologists

    December 12, 2011

    Are recent controversies over metal-on-metal hip replacements and an IOM report cause for worry?

  • About Us
  • Meet the Editors
  • Issue Archives
  • Contribute
  • Advertise
  • Contact Us
  • Copyright © 2025 by John Wiley & Sons, Inc. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies. ISSN 1931-3268 (print). ISSN 1931-3209 (online).
  • DEI Statement
  • Privacy Policy
  • Terms of Use
  • Cookie Preferences