Alert: New HIPAA Rules Could Affect Your Organization

Written by CipherTrust

Failure to adhere torepparttar new guidelines could cost your company up to $250,000 per infraction!

On April 21, 2005 (just over three weeks from today), a new Health Insurance Portability and Accountability Act (HIPAA) security rule goes into effect. The requirements of this rule, which are basically information security best practices, focus onrepparttar 135967 three cornerstones of a solid information security infrastructure: confidentiality, integrity and availability of information.

The imminent HIPAA regulatory requirements encompass transmission, storage and discoverability of Protected Health Information (PHI). Givenrepparttar 135968 widespread use and mission-critical nature of email, enforcement of HIPAA encryption policies andrepparttar 135969 growing demand for secure email solutions, email security has never been more important torepparttar 135970 healthcare industry than it is right now.

Although many assume it applies only to health care providers, HIPAA affects nearly all companies that regularly transmit or store employee health insurance information. HIPAA was signed into law in 1996 by former President Bill Clinton, withrepparttar 135971 intent of protecting employee health and insurance information when workers changed or lost their jobs. As Internet use became more widespread inrepparttar 135972 mid-to-late 1990s, HIPAA requirements overlapped withrepparttar 135973 digital revolution and offered direction to organizations needing to exchange healthcare information.

HIPAA inrepparttar 135974 Workplace Collaboration between employers and healthcare professionals has grown increasingly digital, and email has played an ever-increasing role in this communication. However, emailís increased importance can lead to severe consequences without proper security and privacy measures implemented.

In addition torepparttar 135975 usual concerns about privacy and security of email correspondence, even organizations that are not inrepparttar 135976 healthcare industry must now considerrepparttar 135977 regulatory compliance requirements associated with HIPAA. The Administrative Simplification section of HIPAA, which, among other things, mandates privacy and security of Protected Health Information (PHI), has sparked concern about how email containing PHI should be treated inrepparttar 135978 corporate setting. HIPAA, as it relates to email security, is an enforcement of otherwise well-known best practices that include:

  • Ensuring that email messages containing PHI are kept secure when transmitted over an unprotected link
  • Ensuring that email systems and users are properly authenticated so that PHI does not get intorepparttar 135979 wrong hands
  • Protecting email servers and message stores where PHI may exist

5 Rules of Forwarding E-mails

Written by Judith Kallos

Forwarding of e-mails is one ofrepparttar topics I get contacted aboutrepparttar 135197 most. And, one which also causes hurt feelings and misunderstandings more than any other topic. Daily, e-mails flow in from onliners asking about a "nice way" of telling someone they care about, relative, friend or associate to not forward attachments, chain e-mails, political commentary orrepparttar 135198 jokes that are so prevalent online.

Netizens are afraid to ask others to stop and those who are asked to stop, no matter how nicely, get offended and feel as though their thoughtfulness is not appreciated. But let's think about this a moment. How really thoughtful is it to clickrepparttar 135199 forward arrow, then a bunch of e-mail addresses and hit send? Well, your brain had to "think" about those steps but does that makerepparttar 135200 effort truly "thoughtful." I don't think so...

Here arerepparttar 135201 5 Rules of Forwarding E-mails that those who are being truly thoughtful follow. If everyone followed them allrepparttar 135202 problems associated with forwarded e-mails could be avoided. Sticking to these guidelines will assist both those thinking they are thoughtful and those who don't want to appear otherwise:

1. Don't forward anything without editing out allrepparttar 135203 forwarding >>>>, e-mail addresses, headers and commentary from allrepparttar 135204 other forwarders. Don't make folks look amongst allrepparttar 135205 gobbly-gook to see what it is you thought was worth forwarding. If you must forward, only forwardrepparttar 135206 actual "guts" or content ofrepparttar 135207 e-mail that you are ofrepparttar 135208 opinion is valuable.

2. If you cannot takerepparttar 135209 time to write a personal comment atrepparttar 135210 top of your forwarded e-mail torepparttar 135211 person you are sending to - then you shouldn't forward it at all.

3. Think carefully about if what you are forwarding will be of value (accurate information), appreciated (somethingrepparttar 135212 recipient needs) or humorous (do they haverepparttar 135213 same sense of humor as you do) torepparttar 135214 person onrepparttar 135215 other side. Or do you just think it is worthy? If you cannot think of whyrepparttar 135216 person you are forwarding to would like to receiverepparttar 135217 e-mail - then don't forward it.

Cont'd on page 2 ==> © 2005
Terms of Use