Providers like the convenience of messaging colleagues and patients, not realizing that they could be violating HIPAA regulations by sending protected health information. It’s a fairly common problem.
A young woman was found guilty of involuntary manslaughter after texting her boyfriend encouragement to commit suicide. Certainly, the case has legal implications, but are there psychiatric ones?
Providers must confer with federal HIPAA guidance as well as state laws permitting patients access to their clinical records upon request.
SAMHSA recently published its long-awaited final rules governing confidentiality of patient records for substance abuse disorders. Here is what treatment centers need to know about them.
A new report finds that the healthcare industry is lacking in basic security awareness among staff with a heightened risk of attacks through social engineering.
Hackers are crippling behavioral healthcare organizations’ operations by holding their data hostage with ransomware. Here are ways to prevent such an attack on your system.
HIEs can help providers offer a higher quality of care that reflects well in a value-based payment model, but significant groundwork must be completed before participating.
The American Telemedicine Association report card helps decision-makers assess which states are supportive of new telehealth services and which ones have failed to remove roadblocks.
The use of EHRs in behavioral health is significantly lower than general healthcare, and developing structure and standardization will be critical for increasing the tech’s viability, according to a new report.
Clinicians need to be trained to think through their ethical and legal duties related to confidentiality, that is, their duty to protect the patient’s privacy when using any app.
Maintaining patient records on a cloud-based platform helped Creative Treatment Options resume daily operations quickly after a devastating fire destroyed its facility.
Providers of all sizes can take proactive steps to avoid security breaches while also creating a plan to react quickly if a breach does occur.
View issues archive
Get the Digital Edition