article thumbnail

High Severity Vulnerabilities Identified in Philips Intellispace Cardiovascular (ISCV)

The HIPAA Journal

An attacker can exploit the vulnerabilities to replay the session of a logged-in user and gain access to patient records. The post High Severity Vulnerabilities Identified in Philips Intellispace Cardiovascular (ISCV) appeared first on The HIPAA Journal. Both vulnerabilities have been assigned a CVSS v3.1 severity score of 7.7

HIPAA 75
article thumbnail

How To Maintain Business Continuity and Compliance During An Emergency

Electronic Health Reporter

Healthcare organizations know just how important it is to comply with the HIPAA Privacy Rule to protect sensitive and unstructured data such as patient records, scripts, discharge summaries, medical forms, authorizations, prescriptions, and insurance claims.

HIPAA 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Insider Breaches Reported by Providence Mission Heritage Endocrinology & Samaritan Health Services

The HIPAA Journal

Samaritan Health Services Samaritan Health Services in Oregon has announced that a physician who worked at its Lebanon Community Hospital may have accessed the protected health information of patients without authorization. An investigation was launched in November 2023, when unauthorized access was suspected.

HIPAA 120
article thumbnail

Healthcare Data Security Breach: What to Do If Your Records Have Been Hacked

Scrubs

These data breaches have affected millions of patients, putting their sensitive healthcare information at risk. In 2018, the healthcare sector saw 15 million patient records compromised across 503 breaches, which was three times the amount seen in 2017. The number of healthcare data breaches keeps going up year after year.

Follow-Up 240
article thumbnail

3 potential data and compliance breaches in your medical billing 

Health Prime

Unauthorized access to patient records Unauthorized access to patient records is one of the most significant data security threats in medical billing. This breach can occur when employees or external hackers gain access to sensitive patient information without proper authorization.

Billing 105
article thumbnail

Medical billing audits: A proactive approach to compliance and revenue protection 

Health Prime

Electronic Health Records (EHR) and practice management systems are goldmines of information. Review Documentation: Review the patient record, encounter forms, and billing documents for completeness and accuracy. The practice should comply with HIPAA regulations and every other applicable law.

Billing 52
article thumbnail

Simplifying Medical Documentation: The Role of Healthcare Document Scanners

Scrubs

Agendas are filled to the brim, and stacks of patient records teeter on desks, demanding attention. Easy to set up and operate, they come equipped with features like automatic document feeders, optical character recognition (OCR) and secure, HIPAA-compliant cloud storage options.