Most people are familiar with HIPAA. It is an Act that has been in effect since 1996. It stands for the Health Insurance Portability and Accountability. It is a series of guidelines that healthcare providers need to follow to be in compliance with the act. For the sake of simplicity, there are 3 parts to the act.
The most difficult aspects of HIPAA are the ones related to technology. Why are they so complicated? For starters, medical personnel aren’t experts in computer science. When you’re unfamiliar with Technology. It can be tough to understand software and security requirements.
  • Encrypt files at rest or in transit. Ensuring where ever your ePHI data resides on a hard drive, in the cloud or in an email. That it is encrypted.
  • Protect your network from outside attacks using security software and encryption. Ensuring you have adequate malware protection. Ensuring you have properly managed equipment with the latest firmware and updates.
  • Protect your data from accidental deletions and changes. Have proper logging and chain of custody protocols in place.
  • Keep up-to-date documentation of technology and network configurations and HIPAA practices.
These are just a few of the things required to meet the technical requirements.
The most common cause of a HIPAA data breach is a lost or stolen laptop, computer, hard drive, or other devices. So it’s no surprise that HIPAA also requires strong physical security at your office.
  • Limit physical access to computers. Keeping them behind counters, locked to desks.
  • Restrict access to secure areas. Watch building safety, and require visitors to sign in.
  • Keep workstations out of public view and shield screens from passersby.
  • Exercise caution follow best practices when removing or throwing away hardware and software. (e.g., wipe hard drives before disposing of them).
  • Train employees and contractors on physical safety best practices.
These are just a few of the things required to meet the technical requirements.
In order for your healthcare business’s administrative procedures to be HIPAA compliant.
  • Formalize your privacy procedures in a written document.
  • Designate a privacy officer to oversee data security and HIPAA compliance.
  • Identify which employees have access to ePHI.
  • Develop a training program for employees to learn your privacy policy. How to apply them to their job/
  • Require outside contractors who may access to private data sign a BAA. A BAA is a Business Associates Agreement. Any contractor or Business Associate who has or may have access to your ePHI needs to sign this. In turn, they should also be HIPAA compliant.
  • Create a data breach response plan that includes how to contact customers, minimize data loss, and fix IT.
Why is it Important for Healthcare Companies to use a HIPAA compliant I.T. company. Like Underdog Computer and Network Support LLC.
I.T. firms generally assist healthcare providers with requirements 1 and 2. Because the are “responsible” for the client’s technology. If you expanded the requirements for administrative. You will notice the requirement for any outside contractor that has or may have access to ePHI sign a BAA. ePHI is electronic Patient Health Information. Basically data on your network. This is exactly what I.T. firms do. While they may not actively be looking at this data they do come in contact with it.
Now here is the problem most I.T. firms are not HIPAA compliant themselves. As part of your due diligence, you need to make sure the partners you work with are HIPAA compliant. If they are not you can be fined for not being in compliance. The government is cracking down on compliance and more audits are being done every year.
Why is it Important for NON-Healthcare Companies to use a HIPAA compliant I.T. company. Like Underdog Computer and Network Support LLC.
Achieving HIPAA Compliance is an expensive process to undertake. More importantly, it requires a magnifying glass look at how you do business. Developing processes and procedures for handling sensitive data. Regardless of whether you are in healthcare or not, every company has sensitive data. Underdog takes the same care or precautions we do with ePHI as we do with any other data. To us regardless of the client it all ePHI. We consider it all confidential. Safety and Security are the cornerstones of our foundation.

Call Underdog Today


Want to Know More

Client Testomonials

We found it very easy to work with Underdog. He gave a very clear and professional quote, he has been promptly responsive in all communications, and the network is working great. I feel very good about using his company for any future IT needs for our business.
Pam Watkins, Forks Bistro
Barton Heights had a very successful computer upgrade due to Underdog.  I met with him 2-3 months before the project and he gave us an estimate of the entire upgrade process involving 31 computers and a server.  He advised us and placed the order.  He also worked with us and ended up revising the estimate twice to completely satisfy our computer upgrade needs.  He added true value to his service as he was willing to perform the upgrade in the evening when we were closed to minimize our down time as we are a paperless business and rely 100% on our computers.  Carmine stepped up and took care of those problems as well, even though that was not his responsibility.  He always responds quickly to any issue that occurs.  I would highly recommend him to anyone!
Dr. Jeremy Wentz., Barton Heights Veterinary Hospital
Tim Stump, Shawnee Mountain Ski Area
Underdog makes you feel that you are his first concern if you have a Server down or you have a small printing question.  We have been with Carmine for 16 years and have only received quality service.
Dee McConnel, Straub Metal International
Thank you Underdog.  Will recommend you from the rooftops.
Law Office of Maria T. Candelaria, Maria Candelaria
12 years in business and I have been there and done that with other IT / Computer biz, and finally found one that listens, asks questions, and comes up with a plan. If you are having issues or just want to see if there are options for and avenues of improvement for your computer / networking needs, checkout Underdog Computer and Network Support LLC. There are some others that are good, but I cannot express the difference enough - they actually get it! Every business IS different with different needs and processes, and they take the time to find what is best for you instead of what they think is best for you! Thank you, Carmine J. Corridore, for allowing me to have a stress free vacation this year! I look forward to working with you in the near future for some serious upgrades!
Carollee Streeter Kidd, CLK Transcription
"Underdog Computer and Network Support are amazing. They go over and above to help the small business owner Thank you Carmine for all you do"
Jennifer Narkavich, My Girl Managed Services - Marketing Consultant
Underdog Came out to install our Phone System. They made a complicated process easy. Brian Davis, Full Circle Removal.
Brian Davis, Full Circle Removal
We have used Underdog Computer and Networking for business and personal use.  We have found them easy to schedule an appointment, very responsive, professional, and quick to isolate the problem and/or identify our real need.  We highly recommend Underdog.
Denise Flietman, Spread Eagle Realty
Jill Reeder, Pearl S Buck International

For More Information Fill out form below

[wpforms id=”5383″]