Skip to content

Commit

Permalink
links and images updated
Browse files Browse the repository at this point in the history
  • Loading branch information
truevault authored and truevault committed May 30, 2014
1 parent f490024 commit b838e62
Show file tree
Hide file tree
Showing 2 changed files with 6 additions and 4 deletions.
4 changes: 3 additions & 1 deletion 01 Introduction.md
Expand Up @@ -31,4 +31,6 @@ We're software developers just like you, but we've spent countless hours researc

However, we need to be clear—we're not lawyers and you should not take this as legal advice. If you need to make business decisions around HIPAA you'll probably sleep better at night knowing you paid a very expensive attorney to give their opinion on your specific question.

[Chapter 2: What is HIPAA?](https://github.com/truevault/hipaa-compliance-developers-guide/blob/master/01%20Introduction.md)
#### Navigation

[Chapter 2: What is HIPAA?](https://github.com/truevault/hipaa-compliance-developers-guide/blob/master/02%20What%20is%20HIPAA%3F.md)
6 changes: 3 additions & 3 deletions 07 HIPAA Fines.md
Expand Up @@ -8,12 +8,12 @@ The fines and charges are broken down into 2 major categories: “Reasonable Cau

**HIPAA violation categories and their respective penalty amounts are outlined in the chart below:**

[insert image]
![hipaa violations summary](https://dg80atg7s3qsy.cloudfront.net/blog/img/hipaa-violations.png)

Source: HHS, Federal Register.gov

## Unencrypted Data
While encryption is an addressable (rather than required) specification, it does not mean optional. The vast majority of data breaches are due to stolen or lost data that was unencrypted. When in doubt, you should implement the [addressable implementation specifications](#) of the Security Rule. Most of them are best practices.
While encryption is an addressable (rather than required) specification, it does not mean optional. The vast majority of data breaches are due to stolen or lost data that was unencrypted. When in doubt, you should implement the [addressable implementation specifications](https://github.com/truevault/hipaa-compliance-developers-guide/blob/master/04%20HIPAA%20Security%20Rule.md#required-vs-addressable-specifications) of the Security Rule. Most of them are best practices.

## Employee Error
Breaches can occur when employees lose unencrypted portable devices, mistakenly send PHI to vendors who post that information online, and disclose personally identifiable, sensitive information on social networks.
Expand All @@ -30,7 +30,7 @@ Some of the largest breaches reported to HHS have involved business associates.

**What sort of penalties are we talking about? Check out this chart with fines levied in years past:**

[insert image]
![hipaa fines table](https://dg80atg7s3qsy.cloudfront.net/blog/img/hipaa-fines.png)

Source: HHS, Case Examples and Resolution Agreements

Expand Down

0 comments on commit b838e62

Please sign in to comment.