Most people are familiar with HIPAA. It is an Act that has been in effect since 1996. It stands for the Health Insurance Portability and Accountability. It is a series of guidelines that healthcare providers need to follow to be in compliance with the act. For the sake of simplicity, there are 3 parts to the act.
The most difficult aspects of HIPAA are the ones related to technology. Why are they so complicated? For starters, medical personnel aren’t experts in computer science. When you’re unfamiliar with Technology. It can be tough to understand software and security requirements.
  • Encrypt files at rest or in transit. Ensuring where ever your ePHI data resides on a hard drive, in the cloud or in an email. That it is encrypted.
  • Protect your network from outside attacks using security software and encryption. Ensuring you have adequate malware protection. Ensuring you have properly managed equipment with the latest firmware and updates.
  • Protect your data from accidental deletions and changes. Have proper logging and chain of custody protocols in place.
  • Keep up-to-date documentation of technology and network configurations and HIPAA practices.
These are just a few of the things required to meet the technical requirements.
The most common cause of a HIPAA data breach is a lost or stolen laptop, computer, hard drive, or other devices. So it’s no surprise that HIPAA also requires strong physical security at your office.
  • Limit physical access to computers. Keeping them behind counters, locked to desks.
  • Restrict access to secure areas. Watch building safety, and require visitors to sign in.
  • Keep workstations out of public view and shield screens from passersby.
  • Exercise caution follow best practices when removing or throwing away hardware and software. (e.g., wipe hard drives before disposing of them).
  • Train employees and contractors on physical safety best practices.
These are just a few of the things required to meet the technical requirements.
In order for your healthcare business’s administrative procedures to be HIPAA compliant.
  • Formalize your privacy procedures in a written document.
  • Designate a privacy officer to oversee data security and HIPAA compliance.
  • Identify which employees have access to ePHI.
  • Develop a training program for employees to learn your privacy policy. How to apply them to their job/
  • Require outside contractors who may access to private data sign a BAA. A BAA is a Business Associates Agreement. Any contractor or Business Associate who has or may have access to your ePHI needs to sign this. In turn, they should also be HIPAA compliant.
  • Create a data breach response plan that includes how to contact customers, minimize data loss, and fix IT.
Why is it Important for Healthcare Companies to use a HIPAA compliant I.T. company. Like Underdog Computer and Network Support LLC.
I.T. firms generally assist healthcare providers with requirements 1 and 2. Because the are “responsible” for the client’s technology. If you expanded the requirements for administrative. You will notice the requirement for any outside contractor that has or may have access to ePHI sign a BAA. ePHI is electronic Patient Health Information. Basically data on your network. This is exactly what I.T. firms do. While they may not actively be looking at this data they do come in contact with it.
Now here is the problem most I.T. firms are not HIPAA compliant themselves. As part of your due diligence, you need to make sure the partners you work with are HIPAA compliant. If they are not you can be fined for not being in compliance. The government is cracking down on compliance and more audits are being done every year.
Why is it Important for NON-Healthcare Companies to use a HIPAA compliant I.T. company. Like Underdog Computer and Network Support LLC.
Achieving HIPAA Compliance is an expensive process to undertake. More importantly, it requires a magnifying glass look at how you do business. Developing processes and procedures for handling sensitive data. Regardless of whether you are in healthcare or not, every company has sensitive data. Underdog takes the same care or precautions we do with ePHI as we do with any other data. To us regardless of the client it all ePHI. We consider it all confidential. Safety and Security are the cornerstones of our foundation.

Call Underdog Today

570-243-9205

Want to Know More

Client Testomonials

We found it very easy to work with Underdog. He gave a very clear and professional quote, he has been promptly responsive in all communications, and the network is working great. I feel very good about using his company for any future IT needs for our business.
Pam Watkins, Forks Bistro
Barton Heights had a very successful computer upgrade due to Underdog.  I met with him 2-3 months before the project and he gave us an estimate of the entire upgrade process involving 31 computers and a server.  He advised us and placed the order.  He also worked with us and ended up revising the estimate twice to completely satisfy our computer upgrade needs.  He added true value to his service as he was willing to perform the upgrade in the evening when we were closed to minimize our down time as we are a paperless business and rely 100% on our computers.  Carmine stepped up and took care of those problems as well, even though that was not his responsibility.  He always responds quickly to any issue that occurs.  I would highly recommend him to anyone!
Dr. Jeremy Wentz., Barton Heights Veterinary Hospital

I HAVE WORKED WITH CARMINE FOR MANY YEARS.  HE HAS DONE EVERYTHING FROM NETWORK SERVER INSTALLATION TO PROGRAM TROUBLESHOOTING.  HIS QUALITY OF WORK AND KNOWLEDGE ARE OUTSTANDING.   YOU CAN ALWAYS COUNT ON Underdog TO WORK HARD FOR YOU.

Tim Stump, Shawnee Mountain Ski Area
Underdog makes you feel that you are his first concern if you have a Server down or you have a small printing question.  We have been with Carmine for 16 years and have only received quality service.
Dee McConnel, Straub Metal International
Thank you Underdog.  Will recommend you from the rooftops.
Law Office of Maria T. Candelaria, Maria Candelaria

12 years in business and I have been there and done that with other IT / Computer biz, and finally found one that listens, asks questions, and comes up with a plan.

If you are having issues or just want to see if there are options for and avenues of improvement for your computer / networking needs, checkout Underdog Computer and Network Support LLC.

There are some others that are good, but I cannot express the difference enough - they actually get it! Every business IS different with different needs and processes, and they take the time to find what is best for you instead of what they think is best for you!

Thank you, Carmine J. Corridore, for allowing me to have a stress free vacation this year! I look forward to working with you in the near future for some serious upgrades!

Carollee Streeter Kidd, CLK Transcription

"Underdog Computer and Network Support are amazing. They go over and above to help the small business owner Thank you Carmine for all you do"

Jennifer Narkavich, My Girl Managed Services - Marketing Consultant

Underdog Came out to install our Phone System. They made a complicated process easy. Brian Davis, Full Circle Removal.

Brian Davis, Full Circle Removal

We have used Underdog Computer and Networking for business and personal use.  We have found them easy to schedule an appointment, very responsive, professional, and quick to isolate the problem and/or identify our real need.  We highly recommend Underdog.

Denise Flietman, Spread Eagle Realty

For More Information Fill out form below

Computer and Network Support

Traditional Computer and Network Support Services.

Traditional I.T. Services

Break/Fix IT Services for Businesses that Need Occasional IT Support.
Don’t Fear, We Fix IT Here!

[Learn More]

Web/Application Development

We are well versed in different languages for any Project

Looking for an out of the box application

If you are looking for a Web Based “Cloud” Application or Desktop Application. We can Help!

[Learn More]

Underdog Serenity Care

Our Services are Designed to Allow you to get back to your Business

White Glove Service

with Peace of Mind. All our Services are built around Security!

[Learn More]
Project Management, Project Consulting, Consulting

Project Based Consulting

From Project Management to One Off Projects

Have an I.T. Project that you need help with?

Have a big project that you don’t want to tie up your Staff with, give us a call Today! We can Lead or Follow

Threat Protection, Prevention and Education. Underdog Computer and Network Support takes your security serious

Cyber Security Threat Protection and Prevention

We help you protect and defend what you spent years building

Cyber Crime on the Rise

We help you Protect what is yours! Put in Tools to Prevent Attacks in the First Place!

[Learn More]
Structured Cabling, Low Voltage Cabling, Cat 5,6,5e. Coax Network Management

Structured Cabling

Renovating, Building or Expanding. Before You Close the Walls Call Us

Ethernet Cabling

If you are building, expanding or renovating your office NOW is the time. We do full Network Designs!

[Learn More]