{"id":12658,"date":"2020-05-22T05:39:32","date_gmt":"2020-05-22T09:39:32","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=12658"},"modified":"2022-06-21T08:04:28","modified_gmt":"2022-06-21T12:04:28","slug":"how-to-avoid-the-devastating-consequences-of-hipaa-noncompliance","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-to-avoid-the-devastating-consequences-of-hipaa-noncompliance\/","title":{"rendered":"How to avoid the devastating consequences of HIPAA noncompliance?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12659 aligncenter\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/05\/mike-kononov-lFv0V3_2H6s-unsplash-scaled.jpg\" alt=\"\" width=\"2560\" height=\"1440\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/05\/mike-kononov-lFv0V3_2H6s-unsplash-scaled.jpg 2560w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/05\/mike-kononov-lFv0V3_2H6s-unsplash-600x338.jpg 600w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/05\/mike-kononov-lFv0V3_2H6s-unsplash-1024x576.jpg 1024w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/05\/mike-kononov-lFv0V3_2H6s-unsplash-768x432.jpg 768w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/05\/mike-kononov-lFv0V3_2H6s-unsplash-1536x864.jpg 1536w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/05\/mike-kononov-lFv0V3_2H6s-unsplash-2048x1152.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">HIPAA &#8211; Health Insurance Portability and Accountability Act is a security rule that was established in 1996 for protecting the personal<\/span><a href=\"https:\/\/www.m2sys.com\/blog\/health-care\/7-crucial-steps-healthcare-organizations-need-to-take-to-secure-their-health-it-infrastructure\/amp\/\"><span style=\"font-weight: 400;\"> health<\/span><\/a><span style=\"font-weight: 400;\"> information of individuals electronically. Some of these are lab results, medical bills, health history, and other health information that are easily identifiable. This information is established, maintained, and used by some entities such as healthcare clearinghouses, health plans, and healthcare providers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">From 1996 till date, many companies have been fined and punished for HIPAA breaches. Irrespective of the size of the company, whenever there is a HIPAA breach, there usually is a fine.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Requirements of the HIPAA Initiative<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">There are 3 major requirements of the HIPAA initiative. The safeguards and controls by companies <\/span><a href=\"https:\/\/cloudapper.com\/hipaa-ready-compliance-software\/\"><span style=\"font-weight: 400;\">compliant with the HIPAA<\/span><\/a><span style=\"font-weight: 400;\"> are so that they can meet all 3 requirements.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">The Privacy Rule<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The major function of HIPAA is to make sure that personal health information is kept private. The first requirement for HIPAA is the privacy rule. This rule sets the standards that are used for the protection of medical records and the different types of personal health information. It also sets all conditions and limits for disclosing personal health information without authorization from the patient. With this rule, the patients have a right to hold a sample of their medical records and also ask for corrections to be made to their personal health information if the needs be.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">The Security Rule<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">For every business that the HIPAA initiative concerns, there has to be established security protocols and standards for the protection of electronic personal health information (ePHI). These protocols are used for all ePHI that\u2019s either created, maintained, received, or used by the company and all their business associates. According to some OTR guidelines on the<\/span><a href=\"https:\/\/www.bestdissertation.com\/write-my-thesis.html\"><span style=\"font-weight: 400;\"> write my thesis<\/span><\/a><span style=\"font-weight: 400;\"> platform, in order to ensure the security, integrity, and confidentiality of the personal health information, there has to be administrative, technical, and physical safeguards that are put in place. This is what the security rule is all about.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Notification When the Protected Health Information is Breached<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The reason for the many safeguards that the security rule dictates is to make sure that these companies are able to avoid security breaches. But in a case where an organization that\u2019s compliant with HIPAA is breached, there are a number of parties that they have to inform. These include the media, some concerned individuals, and depending on the size and type of breach, the Secretary of breaches of unsecured information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to the OCR, it defines a breach in an article on the<\/span><a href=\"https:\/\/www.bestessay.com\/\"><span style=\"font-weight: 400;\"> best writing service<\/span><\/a><span style=\"font-weight: 400;\">, as a disclosure or impermissible use which compromises the privacy or security of the PHI in accordance with the privacy rule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Keeping up with the HIPAA and being compliant is very important for companies that are concerned with the protection of health information. Although this can be challenging, software like HIPAA Ready can be useful. With this compliance software, you can easily customize your policies and procedure to align with the HIPAA policies for your organization. It also has other features that allow you to create a digital checklist for your tasks, as well as train your employees with the HIPAA training courses following a training schedule. This platform is very interactive, has secure access management, and allows you to comply with HIPAA efficiently.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Where Companies Fail with HIPAA Compliance<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Failing to comply with HIPAA is basically a failure with the security rule of the HIPAA initiative. This security rule has 3 different parts; the administrative safeguards, physical safeguards, and the technical safeguards. All three safeguards have their individual specifications sets which are addressable or required.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s important to know that an addressable specification is not a free ride for you to ignore. It only infers that you can be flexible when implementing it, but it shouldn\u2019t be ignored. For instance, there might be a safeguard that does not work well with your organization and isn\u2019t right to implement. In this case, you\u2019ll have to look for an alternative specification or you don\u2019t implement it. But it shouldn\u2019t be that you totally ignored it because the decision to not implement it has to be documented and you must be able to explain that decision during an audit. This is where companies start to have compliance issues with HIPAA.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The three safeguards which can cause HIPAA compliance issues for companies are explained below.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Technical Safeguards<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">This safeguard deals with the technology that is used in protecting and accessing electronically protected<\/span><a href=\"https:\/\/www.m2sys.com\/blog\/workforce-management\/rightpunch-for-kronos-improves-patient-experience-of-hospitals\/amp\/\"><span style=\"font-weight: 400;\"> health<\/span><\/a><span style=\"font-weight: 400;\"> information. In order to implement these safeguards, companies choose the mechanisms that are best for them except the encryption of the ePHI because all of it, transmitted or stored, has to be encrypted to the standards of NIST immediately when it\u2019s out of your internal servers. When companies fail with this, they fail to comply with the HIPAA directives.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to these safeguards, the covered entities (companies) have to:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 Implement access control<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 Introduce a mechanism that can be used in the authentication of API.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 Implement decryption and encryption tools.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 Introduce audit controls and activity logs<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 Enhance PCs and other devices to log off automatically.<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">Physical Safeguards<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">These safeguards deal with all physical access to the electronically protected health information in the places where it\u2019s stored, be it cloud storage, or at a data center, or the company\u2019s physical location, or anywhere it may be kept.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to these<\/span><a href=\"https:\/\/hitconsultant.net\/2016\/01\/06\/achieving-hipaa-compliance-as-a-business-associate\/3\/#.XrtzZx4o-w4\"><span style=\"font-weight: 400;\"> safeguards<\/span><\/a><span style=\"font-weight: 400;\">, there are some requirements and standards that must be met without which the covered entity can\u2019t claim compliance. They are:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 Control of access to the facility.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 Positioning and workstation use policies.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 Procedures and policies for mobile devices.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 Hardware inventory<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Without all of these in place, the company will fall short of <\/span><a href=\"https:\/\/cloudapper.com\/hipaa-ready-compliance-software\/\"><span style=\"font-weight: 400;\">HIPAA compliance<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Administrative Safeguards<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">This safeguard deals with the procedures and policies governing the conduct of the organization. It also involves the integration of the security rule and privacy rule into a number of actions and policies to keep up with compliance. In order to implement these safeguards, one requirement of the HIPAA is that a privacy officer and security officer be assigned and dedicated to this.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Some of the requirements of the administrative safeguards are:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 Regularly carrying out a risk assessment.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 Introduction of risk management policy<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 Security training for employees<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 Creation of a backup or contingency plan<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 Testing the backup plan<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 Restriction of access for the third party<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 \u00a0 \u00a0 Reports on security incidents<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">These are the things that covered entities have to put in place in order to comply with the HIPAA requirements. In a situation where a company fails to keep up with any of the requirements for the technical, physical, or administrative safeguards, or all of the 3 safeguards, the company is said to have failed to comply with the HIPAA initiative.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For every violation of the HIPAA initiative that the OCR finds, they issue financial penalties to the erring company and a plan to take corrective actions. There are different tiers for the financial penalties and it is based on the level of knowledge that the company has about HIPAA. For Tier 1, the company is unaware of the violation, and it\u2019s unrealistic for them to avoid it. But at level 4, it indicates that the company has an understanding of the violation but took no actions to correct it. This tier attracts bigger fines, and the fines are adjusted every year to consider inflation.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Conclusion<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">HIPAA compliance is important for covered entities and other companies that work closely with them. Once the company is able to meet the requirements of the privacy and security rules, and also report security branches, then they\u2019re halfway through being compliant. Otherwise, they\u2019ve failed the HIPP initiative.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Need help with HIPAA Compliance? Try <\/span><a href=\"https:\/\/cloudapper.com\/hipaa-ready-compliance-software\/\"><span style=\"font-weight: 400;\">HIPAA Ready<\/span><\/a><span style=\"font-weight: 400;\">. It is a HIPAA compliance software designed to be a modern, affordable and effective way of simplifying compliance. This robust application streamlines the HIPAA compliance management process by managing a digital checklist of tasks, meetings, and training information.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>HIPAA &#8211; Health Insurance Portability and Accountability Act is a security rule that was established in 1996 for protecting the<\/p>\n","protected":false},"author":383,"featured_media":12659,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[197],"tags":[],"class_list":["post-12658","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-patient-identification"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to avoid the devastating consequences of HIPAA noncompliance? - Digital Transformation of Government Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-to-avoid-the-devastating-consequences-of-hipaa-noncompliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to avoid the devastating consequences of HIPAA noncompliance? - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"HIPAA &#8211; Health Insurance Portability and Accountability Act is a security rule that was established in 1996 for protecting the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-to-avoid-the-devastating-consequences-of-hipaa-noncompliance\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-22T09:39:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-21T12:04:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/05\/mike-kononov-lFv0V3_2H6s-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Matthew Bennett\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthew Bennett\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-to-avoid-the-devastating-consequences-of-hipaa-noncompliance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-to-avoid-the-devastating-consequences-of-hipaa-noncompliance\/\"},\"author\":{\"name\":\"Matthew Bennett\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4ee8a06d75140a7a10ac2b0f02c5e792\"},\"headline\":\"How to avoid the devastating consequences of HIPAA noncompliance?\",\"datePublished\":\"2020-05-22T09:39:32+00:00\",\"dateModified\":\"2022-06-21T12:04:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-to-avoid-the-devastating-consequences-of-hipaa-noncompliance\/\"},\"wordCount\":1330,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Patient Identification\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-to-avoid-the-devastating-consequences-of-hipaa-noncompliance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-to-avoid-the-devastating-consequences-of-hipaa-noncompliance\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-to-avoid-the-devastating-consequences-of-hipaa-noncompliance\/\",\"name\":\"How to avoid the devastating consequences of HIPAA noncompliance? - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2020-05-22T09:39:32+00:00\",\"dateModified\":\"2022-06-21T12:04:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-to-avoid-the-devastating-consequences-of-hipaa-noncompliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-to-avoid-the-devastating-consequences-of-hipaa-noncompliance\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-to-avoid-the-devastating-consequences-of-hipaa-noncompliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"How to avoid the devastating consequences of HIPAA noncompliance?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4ee8a06d75140a7a10ac2b0f02c5e792\",\"name\":\"Matthew Bennett\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg\",\"caption\":\"Matthew Bennett\"},\"description\":\"The author leads the digital marketing team at M2SYS Technology and an occasional blogger. He is passionate about writing various government and enterprise biometric identity management technology adoption related topics and the changes it brings on the general people\u2019s lives.\",\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/shaon\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to avoid the devastating consequences of HIPAA noncompliance? - Digital Transformation of Government Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-to-avoid-the-devastating-consequences-of-hipaa-noncompliance\/","og_locale":"en_US","og_type":"article","og_title":"How to avoid the devastating consequences of HIPAA noncompliance? - Digital Transformation of Government Services","og_description":"HIPAA &#8211; Health Insurance Portability and Accountability Act is a security rule that was established in 1996 for protecting the","og_url":"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-to-avoid-the-devastating-consequences-of-hipaa-noncompliance\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2020-05-22T09:39:32+00:00","article_modified_time":"2022-06-21T12:04:28+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/05\/mike-kononov-lFv0V3_2H6s-unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"Matthew Bennett","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Matthew Bennett","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-to-avoid-the-devastating-consequences-of-hipaa-noncompliance\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-to-avoid-the-devastating-consequences-of-hipaa-noncompliance\/"},"author":{"name":"Matthew Bennett","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4ee8a06d75140a7a10ac2b0f02c5e792"},"headline":"How to avoid the devastating consequences of HIPAA noncompliance?","datePublished":"2020-05-22T09:39:32+00:00","dateModified":"2022-06-21T12:04:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-to-avoid-the-devastating-consequences-of-hipaa-noncompliance\/"},"wordCount":1330,"commentCount":1,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Patient Identification"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/patient-identification\/how-to-avoid-the-devastating-consequences-of-hipaa-noncompliance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-to-avoid-the-devastating-consequences-of-hipaa-noncompliance\/","url":"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-to-avoid-the-devastating-consequences-of-hipaa-noncompliance\/","name":"How to avoid the devastating consequences of HIPAA noncompliance? - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2020-05-22T09:39:32+00:00","dateModified":"2022-06-21T12:04:28+00:00","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-to-avoid-the-devastating-consequences-of-hipaa-noncompliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/patient-identification\/how-to-avoid-the-devastating-consequences-of-hipaa-noncompliance\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-to-avoid-the-devastating-consequences-of-hipaa-noncompliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"How to avoid the devastating consequences of HIPAA noncompliance?"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4ee8a06d75140a7a10ac2b0f02c5e792","name":"Matthew Bennett","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg","caption":"Matthew Bennett"},"description":"The author leads the digital marketing team at M2SYS Technology and an occasional blogger. He is passionate about writing various government and enterprise biometric identity management technology adoption related topics and the changes it brings on the general people\u2019s lives.","url":"https:\/\/www.m2sys.com\/blog\/author\/shaon\/"}]}},"modified_by":"Stanly Palma","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/12658"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/383"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=12658"}],"version-history":[{"count":1,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/12658\/revisions"}],"predecessor-version":[{"id":12695,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/12658\/revisions\/12695"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/12659"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=12658"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=12658"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=12658"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}