The Right Prescription for Maintaining Compliance with Patient Security Regulations

Download Now

To download this white paper you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

In the healthcare industry, expensive equipment is usually a point of pride, but one leading provider never intended to pay $1.5 million each for two laptops. Only after the laptops were stolen did it come to light that they contained over 1 million unencrypted patient records — a clear HIPAA violation. The provider ended up settling a class action suit for $3 million, but plenty of other healthcare providers have felt the sting of failing to comply with HIPAA, as well. The next major data breach isn’t a matter of if, only when.

HIPAA fines and settlements are expensive, but they’re just the tip of an even more costly iceberg. After HIPAA costs comes all of the other financial damage. An affected healthcare provider must foot the bill for identity theft protection/ credit monitoring for individual victims. Nearly inevitable civil lawsuits will likely result in costly settlements and judgments.

Depending on the size of the breach, the HIPAA settlement could be the least of a healthcare provider’s worries.

Download this whitepaper to learn more about encryption in the healthcare industry.

Brought to you by

Should you download this content your information may be shared with the sponsors indicated above. Please see the privacy policy for Apricorn here: Please see Infosecurity Magazine’s privacy policy for more information.