{"id":1869,"date":"2019-06-20T12:25:13","date_gmt":"2019-06-20T12:25:13","guid":{"rendered":"https:\/\/www.dssitinc.com\/?p=1869"},"modified":"2021-01-31T20:35:40","modified_gmt":"2021-01-31T20:35:40","slug":"what-constitutes-a-hipaa-breach","status":"publish","type":"post","link":"https:\/\/www.dssitservices.com\/sq\/blog\/what-constitutes-a-hipaa-breach\/","title":{"rendered":"What constitutes a HIPAA breach?"},"content":{"rendered":"<p>A breach is defined as the unauthorized acquisition, access, use, or disclosure of PHI which compromises the security or privacy of the information. HIPAA violations can have very serious consequences ranging from $100 &#8211; $50,000 per incident up to $1.5 Million. The best way to prevent a breach is to always keep PHI confidential and follow proper security practices. Some examples of breaches include:<\/p>\n<ul>\n<li>Viewing patient records without the \u201cneed to know\u201d<\/li>\n<li>Sharing passwords<\/li>\n<li>Not shredding PHI and placing in a trash bin<\/li>\n<li>Posting PHI to social media<\/li>\n<li>Gossiping about patients to friends and family<\/li>\n<li>Losing a laptop or medical devices<\/li>\n<li>Texting patient information<\/li>\n<li>Accessing PHI from a home computer<\/li>\n<li>Not training your staff<\/li>\n<\/ul>\n<p>Not sure about HIPAA or if your IT environment is secure? <a href=\"https:\/\/www.dssitservices.com\/sq\/contact-us\/\">Let our team help!<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>A breach is defined as the unauthorized acquisition, access, use, or disclosure of PHI which compromises the security or privacy of the information. HIPAA violations can have very serious consequences ranging from $100 &#8211; $50,000 per incident up to $1.5 Million. The best way to prevent a breach is to always keep PHI confidential and [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":1868,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[88],"tags":[],"class_list":["post-1869","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What constitutes a HIPAA breach? - Cyber Security<\/title>\n<meta name=\"description\" content=\"A breach is defined as the unauthorized acquisition, access, use, or disclosure of PHI which compromises the security or privacy of information\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dssitservices.com\/sq\/blog\/what-constitutes-a-hipaa-breach\/\" \/>\n<meta property=\"og:locale\" content=\"sq_AL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What constitutes a HIPAA breach? - Cyber Security\" \/>\n<meta property=\"og:description\" content=\"A breach is defined as the unauthorized acquisition, access, use, or disclosure of PHI which compromises the security or privacy of information\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dssitservices.com\/sq\/blog\/what-constitutes-a-hipaa-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"DSS - IT &amp; Cyber Security Management\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DSSIT\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-20T12:25:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-31T20:35:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2019\/06\/image_7a4513e3-6f08-47a6-9a26-41dec3fdb2f120190620_0824187966993916759779153.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"3000\" \/>\n\t<meta property=\"og:image:height\" content=\"2000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dashmir\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dashmir\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minut\u00eb\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/what-constitutes-a-hipaa-breach\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/what-constitutes-a-hipaa-breach\\\/\"},\"author\":{\"name\":\"Dashmir\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#\\\/schema\\\/person\\\/e9b3d9606a136b2363eab4eac99de778\"},\"headline\":\"What constitutes a HIPAA breach?\",\"datePublished\":\"2019-06-20T12:25:13+00:00\",\"dateModified\":\"2021-01-31T20:35:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/what-constitutes-a-hipaa-breach\\\/\"},\"wordCount\":131,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/what-constitutes-a-hipaa-breach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dssitservices.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/image_7a4513e3-6f08-47a6-9a26-41dec3fdb2f120190620_0824187966993916759779153.jpg\",\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"sq\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/what-constitutes-a-hipaa-breach\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/what-constitutes-a-hipaa-breach\\\/\",\"url\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/what-constitutes-a-hipaa-breach\\\/\",\"name\":\"What constitutes a HIPAA breach? - Cyber Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/what-constitutes-a-hipaa-breach\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/what-constitutes-a-hipaa-breach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dssitservices.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/image_7a4513e3-6f08-47a6-9a26-41dec3fdb2f120190620_0824187966993916759779153.jpg\",\"datePublished\":\"2019-06-20T12:25:13+00:00\",\"dateModified\":\"2021-01-31T20:35:40+00:00\",\"description\":\"A breach is defined as the unauthorized acquisition, access, use, or disclosure of PHI which compromises the security or privacy of information\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/what-constitutes-a-hipaa-breach\\\/#breadcrumb\"},\"inLanguage\":\"sq\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/what-constitutes-a-hipaa-breach\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sq\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/what-constitutes-a-hipaa-breach\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.dssitservices.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/image_7a4513e3-6f08-47a6-9a26-41dec3fdb2f120190620_0824187966993916759779153.jpg\",\"contentUrl\":\"https:\\\/\\\/www.dssitservices.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/image_7a4513e3-6f08-47a6-9a26-41dec3fdb2f120190620_0824187966993916759779153.jpg\",\"width\":3000,\"height\":2000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/what-constitutes-a-hipaa-breach\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dssitservices.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What constitutes a HIPAA breach?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#website\",\"url\":\"https:\\\/\\\/www.dssitservices.com\\\/\",\"name\":\"DSS - IT & Cyber Security Management\",\"description\":\"DSS IT is your trusted partner for IT Services and Cybersecurity on Long Island providing expert managed services and secure network support backed by over 20 years of experience.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dssitservices.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sq\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#organization\",\"name\":\"DSS Management Inc\",\"url\":\"https:\\\/\\\/www.dssitservices.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sq\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dssitservices.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/DSS-Logo-Main-1-1.png\",\"contentUrl\":\"https:\\\/\\\/www.dssitservices.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/DSS-Logo-Main-1-1.png\",\"width\":297,\"height\":100,\"caption\":\"DSS Management Inc\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DSSIT\",\"https:\\\/\\\/www.instagram.com\\\/dssit\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/dssitinc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCUfIRO4HxMQ2vLpza29n0Vg\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#\\\/schema\\\/person\\\/e9b3d9606a136b2363eab4eac99de778\",\"name\":\"Dashmir\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sq\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fd09de9db1f62d8c20869011bc627330173d7184985db150edad593263e4bfcc?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fd09de9db1f62d8c20869011bc627330173d7184985db150edad593263e4bfcc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fd09de9db1f62d8c20869011bc627330173d7184985db150edad593263e4bfcc?s=96&d=mm&r=g\",\"caption\":\"Dashmir\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What constitutes a HIPAA breach? - Cyber Security","description":"A breach is defined as the unauthorized acquisition, access, use, or disclosure of PHI which compromises the security or privacy of information","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dssitservices.com\/sq\/blog\/what-constitutes-a-hipaa-breach\/","og_locale":"sq_AL","og_type":"article","og_title":"What constitutes a HIPAA breach? - Cyber Security","og_description":"A breach is defined as the unauthorized acquisition, access, use, or disclosure of PHI which compromises the security or privacy of information","og_url":"https:\/\/www.dssitservices.com\/sq\/blog\/what-constitutes-a-hipaa-breach\/","og_site_name":"DSS - IT &amp; Cyber Security Management","article_publisher":"https:\/\/www.facebook.com\/DSSIT","article_published_time":"2019-06-20T12:25:13+00:00","article_modified_time":"2021-01-31T20:35:40+00:00","og_image":[{"width":3000,"height":2000,"url":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2019\/06\/image_7a4513e3-6f08-47a6-9a26-41dec3fdb2f120190620_0824187966993916759779153.jpg","type":"image\/jpeg"}],"author":"Dashmir","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dashmir","Est. reading time":"1 minut\u00eb"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dssitservices.com\/blog\/what-constitutes-a-hipaa-breach\/#article","isPartOf":{"@id":"https:\/\/www.dssitservices.com\/blog\/what-constitutes-a-hipaa-breach\/"},"author":{"name":"Dashmir","@id":"https:\/\/www.dssitservices.com\/#\/schema\/person\/e9b3d9606a136b2363eab4eac99de778"},"headline":"What constitutes a HIPAA breach?","datePublished":"2019-06-20T12:25:13+00:00","dateModified":"2021-01-31T20:35:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dssitservices.com\/blog\/what-constitutes-a-hipaa-breach\/"},"wordCount":131,"commentCount":0,"publisher":{"@id":"https:\/\/www.dssitservices.com\/#organization"},"image":{"@id":"https:\/\/www.dssitservices.com\/blog\/what-constitutes-a-hipaa-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2019\/06\/image_7a4513e3-6f08-47a6-9a26-41dec3fdb2f120190620_0824187966993916759779153.jpg","articleSection":["Cyber Security"],"inLanguage":"sq","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dssitservices.com\/blog\/what-constitutes-a-hipaa-breach\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dssitservices.com\/blog\/what-constitutes-a-hipaa-breach\/","url":"https:\/\/www.dssitservices.com\/blog\/what-constitutes-a-hipaa-breach\/","name":"What constitutes a HIPAA breach? - Cyber Security","isPartOf":{"@id":"https:\/\/www.dssitservices.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dssitservices.com\/blog\/what-constitutes-a-hipaa-breach\/#primaryimage"},"image":{"@id":"https:\/\/www.dssitservices.com\/blog\/what-constitutes-a-hipaa-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2019\/06\/image_7a4513e3-6f08-47a6-9a26-41dec3fdb2f120190620_0824187966993916759779153.jpg","datePublished":"2019-06-20T12:25:13+00:00","dateModified":"2021-01-31T20:35:40+00:00","description":"A breach is defined as the unauthorized acquisition, access, use, or disclosure of PHI which compromises the security or privacy of information","breadcrumb":{"@id":"https:\/\/www.dssitservices.com\/blog\/what-constitutes-a-hipaa-breach\/#breadcrumb"},"inLanguage":"sq","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dssitservices.com\/blog\/what-constitutes-a-hipaa-breach\/"]}]},{"@type":"ImageObject","inLanguage":"sq","@id":"https:\/\/www.dssitservices.com\/blog\/what-constitutes-a-hipaa-breach\/#primaryimage","url":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2019\/06\/image_7a4513e3-6f08-47a6-9a26-41dec3fdb2f120190620_0824187966993916759779153.jpg","contentUrl":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2019\/06\/image_7a4513e3-6f08-47a6-9a26-41dec3fdb2f120190620_0824187966993916759779153.jpg","width":3000,"height":2000},{"@type":"BreadcrumbList","@id":"https:\/\/www.dssitservices.com\/blog\/what-constitutes-a-hipaa-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dssitservices.com\/"},{"@type":"ListItem","position":2,"name":"What constitutes a HIPAA breach?"}]},{"@type":"WebSite","@id":"https:\/\/www.dssitservices.com\/#website","url":"https:\/\/www.dssitservices.com\/","name":"DSS - IT & Cyber Security Management","description":"DSS IT is your trusted partner for IT Services and Cybersecurity on Long Island providing expert managed services and secure network support backed by over 20 years of experience.","publisher":{"@id":"https:\/\/www.dssitservices.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dssitservices.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sq"},{"@type":"Organization","@id":"https:\/\/www.dssitservices.com\/#organization","name":"DSS Management Inc","url":"https:\/\/www.dssitservices.com\/","logo":{"@type":"ImageObject","inLanguage":"sq","@id":"https:\/\/www.dssitservices.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2019\/01\/DSS-Logo-Main-1-1.png","contentUrl":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2019\/01\/DSS-Logo-Main-1-1.png","width":297,"height":100,"caption":"DSS Management Inc"},"image":{"@id":"https:\/\/www.dssitservices.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DSSIT","https:\/\/www.instagram.com\/dssit\/","https:\/\/www.linkedin.com\/company\/dssitinc\/","https:\/\/www.youtube.com\/channel\/UCUfIRO4HxMQ2vLpza29n0Vg"]},{"@type":"Person","@id":"https:\/\/www.dssitservices.com\/#\/schema\/person\/e9b3d9606a136b2363eab4eac99de778","name":"Dashmir","image":{"@type":"ImageObject","inLanguage":"sq","@id":"https:\/\/secure.gravatar.com\/avatar\/fd09de9db1f62d8c20869011bc627330173d7184985db150edad593263e4bfcc?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd09de9db1f62d8c20869011bc627330173d7184985db150edad593263e4bfcc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fd09de9db1f62d8c20869011bc627330173d7184985db150edad593263e4bfcc?s=96&d=mm&r=g","caption":"Dashmir"}}]}},"_links":{"self":[{"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/posts\/1869","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/comments?post=1869"}],"version-history":[{"count":0,"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/posts\/1869\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/media\/1868"}],"wp:attachment":[{"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/media?parent=1869"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/categories?post=1869"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/tags?post=1869"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}