[googlemaps https://www.google.com/maps/embed?pb=!1m18!1m12!1m3!1d3109.3651887012584!2d-77.06829468447825!3d38.80118487958557!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x89b7b1af30dae77b%3A0xfa4c1e9fe977ded2!2s2111+Eisenhower+Ave%2C+Alexandria%2C+VA+22314!5e0!3m2!1sen!2sus!4v1481837936358&w=600&h=450]
Home / Privacy and Security

Privacy and Security

Privacy and Security


A key component to building trust is to ensure the privacy and security of all health information. If any one in a network lacks trust in the exchange of information due to risks, it could affect their willingness to disclose necessary health information and could have life threatening consequences. To help patients understand their privacy and security rights under HIPAA, visit or refer patients to The HHS Office for Civil Rights: http://www.hhs.gov/ocr/privacy

The Health Information Technology for Economic and Clinical Health (HITECH) Act under the American Recovery and Reinvestment Act (ARRA) of 2009 established a set of incentives and penalties for adoption and use of certified EHR systems. The ultimate vision is to improve the quality of care and the value of American health Care. (Learn More: https://www.cms.gov/Regulations-and-Guidance/Legislation/EHRIncentivePrograms/downloads/FAQsRemediatedandRevised.pdf)
Your practice, not your EHR vendor, is responsible for taking the steps needed to protect the confidentiality, integrity, and availability of health information in your EHR and comply with The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Rules and CMS’ Meaningful Use requirements.

The four main steps in implementing a privacy and security plan are:

• Preparation
• Risk Analysis and Action Plan
• Risk Management
• Meaningful Use


Enjoy this webpage? Please spread the word :)