{"id":43764,"date":"2014-09-04T16:26:00","date_gmt":"2014-09-04T16:26:00","guid":{"rendered":"http:\/\/sticky-highjinx.flywheelsites.com\/?p=43764"},"modified":"2025-03-04T03:23:35","modified_gmt":"2025-03-04T08:23:35","slug":"7-common-sense-rules-for-hipaa-data-integrity","status":"publish","type":"post","link":"https:\/\/envistacorp.techyscouts.dev\/en-au\/2014\/09\/04\/7-common-sense-rules-for-hipaa-data-integrity\/","title":{"rendered":"7 Rules to Ensure the Integrity of HIPAA Protected Health Information"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 3<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>\n<h2 class=\"wp-block-heading\" id=\"h-how-to-ensure-the-privacy-of-protected-health-information\">How to Ensure the Privacy of Protected Health Information<\/h2>\n\n\n\n<p>The HIPAA Privacy Rule sets a set of standards for the protection of certain health information. The Rule requires that special precautions are taken to ensure that the privacy of Protected Health Information (PHI) is maintained through the flow of health information. PHI must be protected as it is created, kept, filed, used and\/or shared.<\/p>\n\n\n\n<p><strong>What constitutes PHI?<\/strong> PHI is any health information transmitted or maintained by any entity subject to HIPAA regulations that can lead to the Identity of an individual or the contents of the information can be used to make a reasonable assumption as to the identity of the individual. PHI can be written, spoken, or electronic.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-maintain-the-security-of-your-passwords\">1. Maintain the security of your passwords<\/h3>\n\n\n\n<p>a.&nbsp;Never share your password.<\/p>\n\n\n\n<p>b.&nbsp;Never write down a password. When you set a new password, you may wish to write down your password until you have a chance to memorize it. If you do this, you should take extreme care not to lose the paper you have written it on. You should destroy the paper (once you have learned the password). If you MUST write down your password, never store it near your workstation.<\/p>\n\n\n\n<p>c.&nbsp;Change your password with some frequency (60-90 days).<\/p>\n\n\n\n<p>d.&nbsp;Never store your password in a programme or browser.<\/p>\n\n\n\n<p>e.&nbsp;Create complex but easy to remember passwords. Passwords should be a minimum of eight characters and contain a combination of letters, numbers and characters. Passwords should not be based on personally identifiable information, like; your name, initials, date of birth, pet\u2019s name, etc&#8230;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-be-mindful-when-faxing-or-printing\">2. Be mindful when faxing or printing<\/h3>\n\n\n\n<p>a.&nbsp;When faxing or printing PHI, monitor the machine closely to obtain the document ASAP.<\/p>\n\n\n\n<p>b.&nbsp;Double check the fax number to make sure you have the correct phone number. You do not want PHI to go to an unintended recipient.<\/p>\n\n\n\n<p>c.&nbsp;Notify the recipient ahead of time so she knows the document is on its way.&nbsp;<\/p>\n\n\n\n<p>d.&nbsp;Use secure shredder bins to dispose of documents containing PHI or other confidential information. Never recycle documents containing confidential information.&nbsp;<\/p>\n\n\n\n<p>e.&nbsp;Keep PHI out of sight and secure it when not in use to prevent unauthorized access.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-use-encrypted-email-when-emailing-phi\">3. Use encrypted email when emailing PHI<\/h3>\n\n\n\n<p>Never use standard email to communicate PHI. Basic email is not encrypted. Email encryption protects the content of a message from being read by anyone but the intended recipients.<\/p>\n\n\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"53370\" class=\"elementor elementor-53370\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-41ad0b5 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"39263\" data-id=\"41ad0b5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-61a0c0b\" data-eae-slider=\"76143\" data-id=\"61a0c0b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-inner-section elementor-element elementor-element-8e36e15 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"20839\" data-id=\"8e36e15\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"aux-parallax-section has_eae_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7452533\" data-eae-slider=\"17818\" data-id=\"7452533\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3001eb9 elementor-grid-1 elementor-posts--align-left elementor-grid-tablet-1 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"3001eb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;cards_columns_tablet&quot;:&quot;1&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-48087 post type-post status-publish format-standard has-post-thumbnail hentry category-white-paper tag-consumer-goods tag-distribution tag-food-beverage tag-information-technology tag-manufacturing tag-non-profit tag-private-equity tag-technology\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/web.envistacorp.techyscouts.dev\/are-managed-service-right-for-your-business\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"471\" src=\"https:\/\/envistacorp.techyscouts.dev\/en-au\/wp-content\/uploads\/sites\/4\/2021\/07\/image-2025-04-09T181015.055-768x471.jpg\" class=\"attachment-medium_large size-medium_large wp-image-117597\" alt=\"A brochure with a person touching a virtual network icon, titled Are Managed Services Right for Your Business? on a blue background. The brochure features enVista branding and technology-themed graphics.\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"aux-parallax-section has_eae_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9c1b27b\" data-eae-slider=\"88064\" data-id=\"9c1b27b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e128e49 elementor-grid-1 elementor-grid-tablet-1 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"e128e49\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;cards_columns_tablet&quot;:&quot;1&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-48087 post type-post status-publish format-standard has-post-thumbnail hentry category-white-paper tag-consumer-goods tag-distribution tag-food-beverage tag-information-technology tag-manufacturing tag-non-profit tag-private-equity tag-technology\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/web.envistacorp.techyscouts.dev\/are-managed-service-right-for-your-business\" tabindex=\"-1\" target=\"_blank\"><div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/envistacorp.techyscouts.dev\/en-au\/wp-content\/uploads\/sites\/4\/2021\/07\/image-2025-04-09T181015.055-300x300.jpg\" class=\"attachment-medium size-medium wp-image-117597\" alt=\"A brochure with a person touching a virtual network icon, titled Are Managed Services Right for Your Business? on a blue background. The brochure features enVista branding and technology-themed graphics.\" srcset=\"https:\/\/envistacorp.techyscouts.dev\/en-au\/wp-content\/uploads\/sites\/4\/2021\/07\/image-2025-04-09T181015.055-300x300.jpg 300w, https:\/\/envistacorp.techyscouts.dev\/en-au\/wp-content\/uploads\/sites\/4\/2021\/07\/image-2025-04-09T181015.055-150x150.jpg 150w, https:\/\/envistacorp.techyscouts.dev\/en-au\/wp-content\/uploads\/sites\/4\/2021\/07\/image-2025-04-09T181015.055-60x60.jpg 60w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">White Paper<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/web.envistacorp.techyscouts.dev\/are-managed-service-right-for-your-business\" target=&quot;_blank&quot;>\n\t\t\t\tAre Managed Services Right for Your Business?\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Gain insight into benefits and various use cases for infrastructure, application and business process managed services.<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/web.envistacorp.techyscouts.dev\/are-managed-service-right-for-your-business\" aria-label=\"Read more about Are Managed Services Right for Your Business?\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tDownload\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-safeguard-your-mobile-devices-smart-phone-tablet-etc\">4. Safeguard your mobile devices (smart phone, tablet, etc.)<\/h3>\n\n\n\n<p>Always secure your device with a passcode or other user authentication. The effectiveness of data protection depends on a strong passcode, so it is important to use a passcode stronger than four digits. Disable access to notification centre and alerts from locked screen to prevent display of potentially sensitive data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-5-hipaa-is-everyone-s-responsibility\">5.&nbsp;HIPAA is everyone\u2019s responsibility<\/h3>\n\n\n\n<p>If you see something or someone who is putting confidential information at risk, it is your duty to report it. If you don\u2019t know how to report a breach or concern, find out from your supervisor or Human Resources department.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-6-access-to-phi-is-limited-to-your-job-description\">6.&nbsp;Access to PHI is limited to your job description<\/h3>\n\n\n\n<p>Curiosity is not acceptable when it comes to viewing or using PHI. You are only permitted access to PHI when it is necessary for you to do your job. You may&#8230;<\/p>\n\n\n\n<p>a. Look at a person\u2019s PHI only if you need it to do your job.<\/p>\n\n\n\n<p>b. Use a person\u2019s PHI only if you need it to do your job.<\/p>\n\n\n\n<p>c. Give a person\u2019s PHI to others when it is necessary for them to do their jobs.<\/p>\n\n\n\n<p>d. Talk to others about a person\u2019s PHI only if it is necessary to do your job.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-7-keep-your-workstation-secure\">7.&nbsp;Keep your workstation secure<\/h3>\n\n\n\n<p>Only engage in work activity on your workstation. This is the safest way to protect PHI. When computers are compromised by adware, spyware or a virus, it puts the PHI on your workstation at risk AND all the workstations and servers on your network at risk. Games, applications and screen savers are typically a doorway for malware. In addition, do not take it upon yourself to install software on your workstation; even if it is work related. Software downloaded off the Internet can provide a gateway for a breach. Even the most reputable software applications can install toolbars and other unwanted add on to your computer.&nbsp;<\/p>\n\n\n\n<p>What can happen when PHI is not safeguarded? For the individual, irresponsible actions in handling PHI can lead to disciplinary actions up to and including termination. Companies can be fined $50,000 per violation, with an annual maximum of $1.5 million.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-comply-with-hipaa-to-safeguard-protected-health-information\">Comply with HIPAA to Safeguard Protected Health Information<\/h2>\n\n\n\n<p>By following these common sense rules, you can ensure that you are handling PHI in accordance with the requirements of HIPAA.<\/p>\n\n\n\n<p>Click the button below to learn more about HIPAA security and compliance risk analysis.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Terri Cundiff outlines 7 common sense rules to ensure the integrity of HIPAA Protected Health Information.<\/p>\n","protected":false},"author":22,"featured_media":34926,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","_searchwp_excluded":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[3475],"tags":[3913,3769,3990],"class_list":["post-43764","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-cyber-security","tag-information-technology","tag-protected-health-information"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>7 Rules for Protecting Health Information | enVista<\/title>\n<meta name=\"description\" content=\"Terri Cundiff outlines 7 common sense rules to ensure the integrity of HIPAA Protected Health Information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/envistacorp.techyscouts.dev\/en-au\/2014\/09\/04\/7-common-sense-rules-for-hipaa-data-integrity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 Rules for Protecting Health Information | enVista\" \/>\n<meta property=\"og:description\" content=\"Terri Cundiff outlines 7 common sense rules to ensure the integrity of HIPAA Protected Health Information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/envistacorp.techyscouts.dev\/en-au\/2014\/09\/04\/7-common-sense-rules-for-hipaa-data-integrity\/\" \/>\n<meta property=\"og:site_name\" content=\"enVista Australia\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-04T16:26:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T08:23:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/envistacorp.techyscouts.dev\/en-au\/wp-content\/uploads\/sites\/4\/2021\/05\/raphael-health-casestudy.png\" \/>\n\t<meta property=\"og:image:width\" content=\"675\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"enVista Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"enVista Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"7 Rules for Protecting Health Information | enVista","description":"Terri Cundiff outlines 7 common sense rules to ensure the integrity of HIPAA Protected Health Information.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/envistacorp.techyscouts.dev\/en-au\/2014\/09\/04\/7-common-sense-rules-for-hipaa-data-integrity\/","og_locale":"en_US","og_type":"article","og_title":"7 Rules for Protecting Health Information | enVista","og_description":"Terri Cundiff outlines 7 common sense rules to ensure the integrity of HIPAA Protected Health Information.","og_url":"https:\/\/envistacorp.techyscouts.dev\/en-au\/2014\/09\/04\/7-common-sense-rules-for-hipaa-data-integrity\/","og_site_name":"enVista Australia","article_published_time":"2014-09-04T16:26:00+00:00","article_modified_time":"2025-03-04T08:23:35+00:00","og_image":[{"width":675,"height":675,"url":"https:\/\/envistacorp.techyscouts.dev\/en-au\/wp-content\/uploads\/sites\/4\/2021\/05\/raphael-health-casestudy.png","type":"image\/png"}],"author":"enVista Marketing","twitter_card":"summary_large_image","twitter_misc":{"Written by":"enVista Marketing","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/envistacorp.techyscouts.dev\/en-au\/2014\/09\/04\/7-common-sense-rules-for-hipaa-data-integrity\/#article","isPartOf":{"@id":"https:\/\/envistacorp.techyscouts.dev\/en-au\/2014\/09\/04\/7-common-sense-rules-for-hipaa-data-integrity\/"},"author":{"name":"enVista Marketing","@id":"https:\/\/envistacorp.techyscouts.dev\/en-au\/#\/schema\/person\/c938d19b1c760a4e1c353086018cb894"},"headline":"7 Rules to Ensure the Integrity of HIPAA Protected Health Information","datePublished":"2014-09-04T16:26:00+00:00","dateModified":"2025-03-04T08:23:35+00:00","mainEntityOfPage":{"@id":"https:\/\/envistacorp.techyscouts.dev\/en-au\/2014\/09\/04\/7-common-sense-rules-for-hipaa-data-integrity\/"},"wordCount":833,"commentCount":0,"publisher":{"@id":"https:\/\/envistacorp.techyscouts.dev\/en-au\/#organization"},"image":{"@id":"https:\/\/envistacorp.techyscouts.dev\/en-au\/2014\/09\/04\/7-common-sense-rules-for-hipaa-data-integrity\/#primaryimage"},"thumbnailUrl":"https:\/\/envistacorp.techyscouts.dev\/en-au\/wp-content\/uploads\/sites\/4\/2021\/05\/raphael-health-casestudy.png","keywords":["Cyber Security","Information Technology","Protected Health Information"],"articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/envistacorp.techyscouts.dev\/en-au\/2014\/09\/04\/7-common-sense-rules-for-hipaa-data-integrity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/envistacorp.techyscouts.dev\/en-au\/2014\/09\/04\/7-common-sense-rules-for-hipaa-data-integrity\/","url":"https:\/\/envistacorp.techyscouts.dev\/en-au\/2014\/09\/04\/7-common-sense-rules-for-hipaa-data-integrity\/","name":"7 Rules for Protecting Health Information | enVista","isPartOf":{"@id":"https:\/\/envistacorp.techyscouts.dev\/en-au\/#website"},"primaryImageOfPage":{"@id":"https:\/\/envistacorp.techyscouts.dev\/en-au\/2014\/09\/04\/7-common-sense-rules-for-hipaa-data-integrity\/#primaryimage"},"image":{"@id":"https:\/\/envistacorp.techyscouts.dev\/en-au\/2014\/09\/04\/7-common-sense-rules-for-hipaa-data-integrity\/#primaryimage"},"thumbnailUrl":"https:\/\/envistacorp.techyscouts.dev\/en-au\/wp-content\/uploads\/sites\/4\/2021\/05\/raphael-health-casestudy.png","datePublished":"2014-09-04T16:26:00+00:00","dateModified":"2025-03-04T08:23:35+00:00","description":"Terri Cundiff outlines 7 common sense rules to ensure the integrity of HIPAA Protected Health Information.","breadcrumb":{"@id":"https:\/\/envistacorp.techyscouts.dev\/en-au\/2014\/09\/04\/7-common-sense-rules-for-hipaa-data-integrity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/envistacorp.techyscouts.dev\/en-au\/2014\/09\/04\/7-common-sense-rules-for-hipaa-data-integrity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/envistacorp.techyscouts.dev\/en-au\/2014\/09\/04\/7-common-sense-rules-for-hipaa-data-integrity\/#primaryimage","url":"https:\/\/envistacorp.techyscouts.dev\/en-au\/wp-content\/uploads\/sites\/4\/2021\/05\/raphael-health-casestudy.png","contentUrl":"https:\/\/envistacorp.techyscouts.dev\/en-au\/wp-content\/uploads\/sites\/4\/2021\/05\/raphael-health-casestudy.png","width":675,"height":675,"caption":"A doctor in a white coat stands with arms crossed, holding a stethoscope, in a bright, blurred medical or hospital setting."},{"@type":"BreadcrumbList","@id":"https:\/\/envistacorp.techyscouts.dev\/en-au\/2014\/09\/04\/7-common-sense-rules-for-hipaa-data-integrity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/envistacorp.techyscouts.dev\/en-au\/"},{"@type":"ListItem","position":2,"name":"7 Rules to Ensure the Integrity of HIPAA Protected Health Information"}]},{"@type":"WebSite","@id":"https:\/\/envistacorp.techyscouts.dev\/en-au\/#website","url":"https:\/\/envistacorp.techyscouts.dev\/en-au\/","name":"enVista Australia","description":"Enabling Enterprise Commerce","publisher":{"@id":"https:\/\/envistacorp.techyscouts.dev\/en-au\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/envistacorp.techyscouts.dev\/en-au\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/envistacorp.techyscouts.dev\/en-au\/#organization","name":"enVista Australia","url":"https:\/\/envistacorp.techyscouts.dev\/en-au\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/envistacorp.techyscouts.dev\/en-au\/#\/schema\/logo\/image\/","url":"https:\/\/envistacorp.techyscouts.dev\/en-au\/wp-content\/uploads\/sites\/4\/2021\/10\/enVista_Logo_White-1.png","contentUrl":"https:\/\/envistacorp.techyscouts.dev\/en-au\/wp-content\/uploads\/sites\/4\/2021\/10\/enVista_Logo_White-1.png","width":348,"height":152,"caption":"enVista Australia"},"image":{"@id":"https:\/\/envistacorp.techyscouts.dev\/en-au\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/envistacorp.techyscouts.dev\/en-au\/#\/schema\/person\/c938d19b1c760a4e1c353086018cb894","name":"enVista Marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/908735372279b00297ea13e45a4947cdb05e2ee7244abfcfb3ea9d263679fa53?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/908735372279b00297ea13e45a4947cdb05e2ee7244abfcfb3ea9d263679fa53?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/908735372279b00297ea13e45a4947cdb05e2ee7244abfcfb3ea9d263679fa53?s=96&d=mm&r=g","caption":"enVista Marketing"},"description":"enVista was founded by supply chain and technology experts in response to market demand for skilled consulting services. Read posts by our Thought Leaders.","url":"https:\/\/envistacorp.techyscouts.dev\/en-au\/author\/envistamarketing\/"}]}},"_links":{"self":[{"href":"https:\/\/envistacorp.techyscouts.dev\/en-au\/wp-json\/wp\/v2\/posts\/43764","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/envistacorp.techyscouts.dev\/en-au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/envistacorp.techyscouts.dev\/en-au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/envistacorp.techyscouts.dev\/en-au\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/envistacorp.techyscouts.dev\/en-au\/wp-json\/wp\/v2\/comments?post=43764"}],"version-history":[{"count":0,"href":"https:\/\/envistacorp.techyscouts.dev\/en-au\/wp-json\/wp\/v2\/posts\/43764\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/envistacorp.techyscouts.dev\/en-au\/wp-json\/wp\/v2\/media\/34926"}],"wp:attachment":[{"href":"https:\/\/envistacorp.techyscouts.dev\/en-au\/wp-json\/wp\/v2\/media?parent=43764"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/envistacorp.techyscouts.dev\/en-au\/wp-json\/wp\/v2\/categories?post=43764"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/envistacorp.techyscouts.dev\/en-au\/wp-json\/wp\/v2\/tags?post=43764"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}