Imagine you are browsing the internet when all of the sudden a window pops up with an alarming message: “You’re machine is being compromised!” or “Your machine is engaged in illegal activity!” These windows are an attempt by cyber criminals to induce panic and steal your information. Find out how to avoid these cybercrimes and protect yourself.
Published in the January 2017 Newsletter
Covered entities are required to enter into a contract with the business associate under the HIPAA regulation to ensure that they will appropriately safeguard protected health information.
Published in the January 2017 Newsletter
Reviews of user access logs are required by the HIPAA regulations to protect the privacy of patient information and to detect any unauthorized access, use, or disclosure.
Published in the January 2017 Newsletter
System access is a privilege. As a University employee, you receive a Confidentiality and Acceptable Use Agreement and a HIPAA and Computer Usage Form.
Published in the January 2017 Newsletter
The Office of HIPAA Privacy & Security continues to provide live Privacy and Security training sessions for University faculty and staff.
Published in the January 2017 Newsletter
The Office of HIPAA Privacy and Security, in collaboration with the IRB, CTSI, and UHealth, has established a “data broker” program.
Published in the January 2017 Newsletter
The Office of HIPAA Privacy and Security conducts random unannounced walkthroughs of the various sites of service of the University of Miami Health System.
Published in the January 2017 Newsletter
We are all familiar with this phrase but what exactly is the “cloud”? “Cloud” is a buzzword used to describe a network of servers with different functions housed in difference places throughout the world.
Published in the February 2018 Newsletter
Anthem Inc, the largest health insurance company in the nation, has agreed to settle litigation in what is said to be the largest settlement ever for a data breach.
Published in the February 2018 Newsletter
Cybercrime continues to generate huge profits for criminals so it’s no secret that hackers are getting more sophisticated with their attacks. Ransomware is a malicious piece of software designed to block access to a computer system until payment is received.
Published in the February 2018 Newsletter
The Electronic Health Record (EHR) has proven to provide more efficient access to patient information thus streamlining workflows and positively impacting patient care. The University provides employees with access to the EHR as a means to carry out the normal functions of their job.
Published in the February 2018 Newsletter