{"id":14136,"date":"2020-11-19T06:21:57","date_gmt":"2020-11-19T11:21:57","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=14136"},"modified":"2022-06-21T07:53:49","modified_gmt":"2022-06-21T11:53:49","slug":"develop-constructive-hipaa-incident-response-plan","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/patient-identification\/develop-constructive-hipaa-incident-response-plan\/","title":{"rendered":"How to Develop a Constructive HIPAA Incident Response Plan"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">No matter how effective your safeguards may be, healthcare facilities are always exposed to different types of security threats. Under the HIPAA Security Rule, a security incident is defined as the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with information in an information system. In simple terms, a HIPAA security incident is an attempt to do something unauthorized. The HIPAA law requires covered entities and business associates to develop robust incident management and response plans under the Security Incident Procedures standard of the <a href=\"https:\/\/cloudapper.com\/hipaa-security-rule-requirements\/?utm_campaign=How%20to%20Develop%20a%20Constructive%20HIPAA%20Incident%20Response%20Plan&amp;utm_medium=blog%20post&amp;utm_source=m2sys%20blog\">HIPAA Security Rule<\/a>.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">HIPAA Incident Response<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Despite having well-established policies and procedures, robust training programs, and commitment to overall <a href=\"https:\/\/www.m2sys.com\/blog\/hipaa-complaince\/what-is-hipaa-compliance-why-it-matters-and-how-to-obtain-it\/?utm_campaign=How%20to%20Develop%20a%20Constructive%20HIPAA%20Incident%20Response%20Plan&amp;utm_medium=blog%20post&amp;utm_source=m2sys%20blog\">HIPAA compliance<\/a>, breaches can still occur. Organizations that deal with protected health information (PHI) must develop a response plan for these incidents, documenting them appropriately, and determining the root causes to prevent further occurrences. Here are some of the best practices to keep in mind:<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Act efficiently when a breach occurs<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Whenever a breach takes place, an organization will have 60 days to address it. How an organization responds will vary depending on the severity of the compliance issue. Even though it may be tempting to wait before addressing the problem, providers should act immediately. If they don\u2019t, they might risk an onsite visit and receive potential penalties if a staff or a patient reports the incident to the HHS. Official bodies want to see that an organization is aware of the incident and has made solid efforts to address the issue. Demonstrating this commitment can help mitigate the risk of receiving penalties.<\/span><\/p>\n<p style=\"text-align: center;\"><style type=\"text\/css\">\r\n.ad-area1 { border-radius: 8px; overflow: hidden; padding: 20px 10px; box-shadow: 0 0px 15px #ddd; margin: 15px 8px; border-top: 5px solid #a81010; }\r\n.left-area, .right-area { width: 50%; float: left; }\r\n.left-area { padding-top: 12px; }\r\n.left-area img { max-width: 95%; }\r\n.right-area h2 { text-align: center; padding-bottom: 0; font-size: 26px; font-weight: 900; margin-top: 0; }\r\n.right-area h2 span { color: #a81010; }\r\n.right-area h3 { text-align: center; font-size: 16px; text-transform: capitalize; font-weight: 700; padding-top: 10px; padding-bottom: 10px; line-height: normal; }\r\n.ad-area-head { text-align: center; font-weight: 900; font-size: 14px; border-bottom: 1px dotted #ddd; width: 70%; margin: 0 auto; }\r\n.ad-area-desc { padding: 5px 0; }\r\n.right-area p { text-align: center; font-size: 12px; padding-bottom: 0; margin: 0; line-height: 2; }\r\n.ad-area-desc b { font-weight: 700; display: block; }\r\n.ad-area1-learn { display: table; margin: 0 auto; background: #a81010; color: #fff; padding: 6px 20px; border-radius: 50px; font-size: 14px; }\r\n.ad-area1-learn:hover { color: #fff; }\r\n\r\n@media (max-width:320px), (max-width:360px), (max-width:375px), (max-width:400px), (max-width:480px) {\r\n.left-area, .right-area { width: 100%; float: none; }\r\n}\r\n<\/style>\r\n<div class=\"ad-area1\">\r\n\t<div style=\"overflow: hidden;\">\r\n\t\t<div class=\"left-area\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/cloudapper.com\/wp-content\/uploads\/2020\/05\/HIPAA-Ready-Display-Ad-1.png\" alt=\"Bio-plugin-SDK\" width=\"\">\r\n\t\t<\/div>\r\n\t\t<div class=\"right-area\">\r\n\t\t\t<h2><span>HIPAA Ready<\/span><\/h2>\r\n\t\t\t<h3>HIPAA Compliance Software<\/h3>\r\n\t\t\t<div class=\"ad-area-head\">Benefits:<\/div>\r\n\t\t\t<div class=\"ad-area-desc\">\r\n\t\t\t\t<p>-Keep HIPAA information in a centralized space<\/p>\r\n\t\t\t\t<p>-Reduce Administrative Burden<\/p>\r\n\t\t\t\t<p>-Conduct Internal Audits<\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<a class=\"ad-area1-learn\" href=\"https:\/\/cloudapper.com\/hipaa-ready-compliance-software\/?utm_source=m2sys%20blog&amp;utm_medium=blog%20post&amp;utm_campaign=How%20to%20Develop%20a%20Constructive%20HIPAA%20Incident%20Response%20Plan\">Learn More<\/a>\r\n\t\t<\/div>\r\n\t<\/div>\t\r\n<\/div><\/p>\n<h2><span style=\"font-weight: 400;\">Document everything<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">A key element of HIPAA compliance is documentation, and documenting the incident is no less important. When a HIPAA breach takes place, organizations must document what, how, when, and where it occurred. Organizations can approach this in a variety of ways, including spreadsheets or paper files. The problem with spreadsheets and paper files is that information stays unorganized and finding the correct file when necessary can be a hassle.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With HIPAA Ready this process is simplified. Not only can you streamline other HIPAA processes like training and audits, but you can also develop and establish a constructive response plan and procedures. In a single, centralized platform, you can note the date of the incident, what happened, who was involved, what was done in response, and how you plan to prevent such issues going forward.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Be upfront with patients<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">When a patient\u2019s health information is inadvertently compromised, providers should be transparent with their patients about what happened, how it happened, and what is being done to fix the situation. A letter to the patients may be enough, but organizations should find a way to discuss the problem with the patients in person to ease their concerns. In the end, if a patient files a complaint to the OCR, the organization will run the risk of facing severe consequences.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Step by step guide on the incident response with HIPAA Ready<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">HIPAA Ready is a one-stop solution for HIPAA compliance. With both a web and mobile application, this robust <a href=\"https:\/\/cloudapper.com\/hipaa-ready-compliance-software\/?utm_campaign=How%20to%20Develop%20a%20Constructive%20HIPAA%20Incident%20Response%20Plan&amp;utm_medium=blog%20post&amp;utm_source=m2sys%20blog\">HIPAA compliance software<\/a> streamlines a variety of tasks, such as workforce training, risk assessment, internal audits, policy management, HIPAA incident response management, and much more.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s a short demonstration of how to create and manage incidents using HIPAA Ready via either web or mobile devices.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Scenario: Suppose Jack has witnessed Jill stealing passwords that are used to access electronic protected health information (ePHI).<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Step 1:<\/strong> By clicking on the \u201cIncident\u201d tab within HIPAA Ready\u2019s platform, Jack will be able to see a summary of previously logged incidents, outlining the title, date of the incident, and whether the situation has been remedied or not. To create a new incident, Jack can simply click on the plus (+) icon.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Step 2:<\/strong> After clicking the plus icon, the page will redirect to the \u201cIncident Information\u201d page. Here, Jack can see that an incident ID number has automatically been generated for him. Jack will need to fill in the following fields: incident title, a brief description of the incident, attach any media files of the incident (such as a photo or video clip), select a project that corresponds with the incident, the date that the incident occurred, the date the incident was discovered, the date the incident was reported, whether it was reported by a vendor or not, and whether the incident occurred because of or by a business associate. Next, Jack will need to select the employee who reported the incident and select the facility at which the incident occurred, which will then automatically pull up the site where the incident occurred.<\/span><\/p>\n<p><iframe loading=\"lazy\" title=\"HIPAA Ready - HIPAA Compliance Management Software | Free HIPAA Certification &amp;  HIPAA Training\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/QZS4QML3eyY?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Step 3:<\/strong> Jack will now be taken to the \u201cIncident Details\u201d page. Here he will be required to fill in the following fields: format (did the incident occur in a paper, electronic or verbal format), the type of incident, and the location of the incident. Once Jack has done all of this, he will just need to hit the Save button.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This will take Jack to the details page of the incident that he has just logged, where he will be able to edit or delete the incident. The next step is to create an investigation for the incident.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you are interested in learning more about the whole process and HIPAA Ready, please <a href=\"https:\/\/cloudapper.com\/contact-us\/?utm_campaign=How%20to%20Develop%20a%20Constructive%20HIPAA%20Incident%20Response%20Plan&amp;utm_medium=blog%20post&amp;utm_source=m2sys%20blog\">get in touch with CloudApper<\/a> today or leave a comment below.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>No matter how effective your safeguards may be, healthcare facilities are always exposed to different types of security threats. Under<\/p>\n","protected":false},"author":414,"featured_media":14140,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"hipaa incident response","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"Learn how you can develop and implement a constructive HIPAA incident response procedures with CloudApper's HIPAA compliance software.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[197],"tags":[1602,1601,1592,1618,1617,1610,1591,1612,1611,1614,1471,1613,1615,1600,1616],"class_list":["post-14136","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-patient-identification","tag-business-associates","tag-covered-entities","tag-health-insurance-portability-and-accountability-act","tag-healthcare-industry","tag-hipaa-breach","tag-hipaa-compliance","tag-hipaa-compliance-software","tag-hipaa-incident-management","tag-hipaa-incident-response","tag-hipaa-privacy-rule","tag-hipaa-ready","tag-hipaa-security-rule","tag-law","tag-protected-health-information","tag-regulations"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Develop a Constructive HIPAA Incident Response Plan - Digital Transformation of Government Services<\/title>\n<meta name=\"description\" content=\"Learn how you can develop and implement a constructive HIPAA incident response procedures with CloudApper&#039;s HIPAA compliance software.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/patient-identification\/develop-constructive-hipaa-incident-response-plan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Develop a Constructive HIPAA Incident Response Plan - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"Learn how you can develop and implement a constructive HIPAA incident response procedures with CloudApper&#039;s HIPAA compliance software.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/patient-identification\/develop-constructive-hipaa-incident-response-plan\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-19T11:21:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-21T11:53:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/11\/develop-a-constructive-hipaa-incident-response-plan-with-hipaa-ready.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"445\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ryan Stephens\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ryan Stephens\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/develop-constructive-hipaa-incident-response-plan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/develop-constructive-hipaa-incident-response-plan\/\"},\"author\":{\"name\":\"Ryan Stephens\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/c9e6899c41456da677ad94df7f72e325\"},\"headline\":\"How to Develop a Constructive HIPAA Incident Response Plan\",\"datePublished\":\"2020-11-19T11:21:57+00:00\",\"dateModified\":\"2022-06-21T11:53:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/develop-constructive-hipaa-incident-response-plan\/\"},\"wordCount\":974,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"business associates\",\"covered entities\",\"health insurance portability and accountability act\",\"healthcare industry\",\"hipaa breach\",\"hipaa compliance\",\"hipaa compliance software\",\"hipaa incident management\",\"hipaa incident response\",\"hipaa privacy rule\",\"HIPAA Ready\",\"hipaa security rule\",\"law\",\"protected health information\",\"regulations\"],\"articleSection\":[\"Patient Identification\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/patient-identification\/develop-constructive-hipaa-incident-response-plan\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/develop-constructive-hipaa-incident-response-plan\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/develop-constructive-hipaa-incident-response-plan\/\",\"name\":\"How to Develop a Constructive HIPAA Incident Response Plan - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2020-11-19T11:21:57+00:00\",\"dateModified\":\"2022-06-21T11:53:49+00:00\",\"description\":\"Learn how you can develop and implement a constructive HIPAA incident response procedures with CloudApper's HIPAA compliance software.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/develop-constructive-hipaa-incident-response-plan\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/patient-identification\/develop-constructive-hipaa-incident-response-plan\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/develop-constructive-hipaa-incident-response-plan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"How to Develop a Constructive HIPAA Incident Response Plan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/c9e6899c41456da677ad94df7f72e325\",\"name\":\"Ryan Stephens\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/048de6baeffcbd2a710c65c45f6d13dc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/048de6baeffcbd2a710c65c45f6d13dc?s=96&d=mm&r=g\",\"caption\":\"Ryan Stephens\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/riyan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Develop a Constructive HIPAA Incident Response Plan - Digital Transformation of Government Services","description":"Learn how you can develop and implement a constructive HIPAA incident response procedures with CloudApper's HIPAA compliance software.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/patient-identification\/develop-constructive-hipaa-incident-response-plan\/","og_locale":"en_US","og_type":"article","og_title":"How to Develop a Constructive HIPAA Incident Response Plan - Digital Transformation of Government Services","og_description":"Learn how you can develop and implement a constructive HIPAA incident response procedures with CloudApper's HIPAA compliance software.","og_url":"https:\/\/www.m2sys.com\/blog\/patient-identification\/develop-constructive-hipaa-incident-response-plan\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2020-11-19T11:21:57+00:00","article_modified_time":"2022-06-21T11:53:49+00:00","og_image":[{"width":800,"height":445,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/11\/develop-a-constructive-hipaa-incident-response-plan-with-hipaa-ready.png","type":"image\/png"}],"author":"Ryan Stephens","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Ryan Stephens","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/develop-constructive-hipaa-incident-response-plan\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/develop-constructive-hipaa-incident-response-plan\/"},"author":{"name":"Ryan Stephens","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/c9e6899c41456da677ad94df7f72e325"},"headline":"How to Develop a Constructive HIPAA Incident Response Plan","datePublished":"2020-11-19T11:21:57+00:00","dateModified":"2022-06-21T11:53:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/develop-constructive-hipaa-incident-response-plan\/"},"wordCount":974,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["business associates","covered entities","health insurance portability and accountability act","healthcare industry","hipaa breach","hipaa compliance","hipaa compliance software","hipaa incident management","hipaa incident response","hipaa privacy rule","HIPAA Ready","hipaa security rule","law","protected health information","regulations"],"articleSection":["Patient Identification"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/patient-identification\/develop-constructive-hipaa-incident-response-plan\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/develop-constructive-hipaa-incident-response-plan\/","url":"https:\/\/www.m2sys.com\/blog\/patient-identification\/develop-constructive-hipaa-incident-response-plan\/","name":"How to Develop a Constructive HIPAA Incident Response Plan - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2020-11-19T11:21:57+00:00","dateModified":"2022-06-21T11:53:49+00:00","description":"Learn how you can develop and implement a constructive HIPAA incident response procedures with CloudApper's HIPAA compliance software.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/develop-constructive-hipaa-incident-response-plan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/patient-identification\/develop-constructive-hipaa-incident-response-plan\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/develop-constructive-hipaa-incident-response-plan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"How to Develop a Constructive HIPAA Incident Response Plan"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/c9e6899c41456da677ad94df7f72e325","name":"Ryan Stephens","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/048de6baeffcbd2a710c65c45f6d13dc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/048de6baeffcbd2a710c65c45f6d13dc?s=96&d=mm&r=g","caption":"Ryan Stephens"},"url":"https:\/\/www.m2sys.com\/blog\/author\/riyan\/"}]}},"modified_by":"Stanly Palma","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/14136"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/414"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=14136"}],"version-history":[{"count":5,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/14136\/revisions"}],"predecessor-version":[{"id":17919,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/14136\/revisions\/17919"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/14140"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=14136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=14136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=14136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}