﻿<?xml version="1.0" encoding="utf-8"?><!--RSS Genrated: Sat, 02 May 2026 11:03:45 GMT--><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:ev="http://purl.org/rss/1.0/modules/event/"><channel><title>HITEQ Center</title><link>https://hiteqcenter.org:443/Resources/Privacy-Security/HIT-Privacy-Security-Best-Practices/rss/1198</link><atom:link href="https://hiteqcenter.org:443/Resources/Privacy-Security/HIT-Privacy-Security-Best-Practices/rss/1198" rel="self" type="application/rss+xml" /><description>RSS document</description><item><dc:creator><![CDATA[Maddie Bishop-Harris]]></dc:creator><title><![CDATA[Health IT Emergency Response Plan Assessment Tool]]></title><link>https://hiteqcenter.org/Resources/Privacy-Security/HIT-Privacy-Security-Best-Practices/health-it-emergency-response-plan-assessment-tool</link><enclosure type="image/jpg" url="https://hiteqcenter.org/Portals/0/EasyDNNNews/2119/HITEQ_emergency-preparedness-rubric_2025_Page_1.png" length="77949"></enclosure><description><![CDATA[<img src="https://hiteqcenter.org/Portals/0/EasyDNNNews/2119/images/HITEQ_emergency-preparedness-rubric_2025_Page_1-300-300-p-L-97.png" alt="" /> The Health IT Emergency Response Plan Assessment Tool helps health centers evaluate and enhance their emergency plans, focusing on optimizing Health IT use during crises. ]]></description><pubDate>Tue, 10 Jun 2025 15:34:00 GMT</pubDate><guid>https://hiteqcenter.org/Resources/Privacy-Security/HIT-Privacy-Security-Best-Practices/health-it-emergency-response-plan-assessment-tool</guid><dc:identifier><![CDATA[55de2fef-80e6-4c14-8972-bc1560005dd4-2119]]></dc:identifier></item><item><dc:creator><![CDATA[Maddie Bishop-Harris]]></dc:creator><title><![CDATA[Addressing Cybersecurity Threats in Health Centers]]></title><link>https://hiteqcenter.org/Resources/Privacy-Security/HIT-Privacy-Security-Best-Practices/addressing-cybersecurity-threats-in-health-centers</link><enclosure type="image/jpg" url="https://hiteqcenter.org/Portals/0/EasyDNNNews/2118/HITEQ_Addressing-Cybersecurity-Threats-in-Health-Centers_2025-update_Page_1.png" length="1524670"></enclosure><description><![CDATA[<img src="https://hiteqcenter.org/Portals/0/EasyDNNNews/2118/images/HITEQ_Addressing-Cybersecurity-Threats-in-Health-Centers_2025-update_Page_1-300-300-p-L-97.png" alt="" /> This article uses the 2020 incident at the Family Health Center of Worcester (FHCW) to explore innovative strategies to bolster health centers' cybersecurity, including leveraging group purchasing ...]]></description><pubDate>Mon, 09 Jun 2025 22:41:00 GMT</pubDate><guid>https://hiteqcenter.org/Resources/Privacy-Security/HIT-Privacy-Security-Best-Practices/addressing-cybersecurity-threats-in-health-centers</guid><dc:identifier><![CDATA[55de2fef-80e6-4c14-8972-bc1560005dd4-2118]]></dc:identifier></item><item><dc:creator><![CDATA[Molly Rafferty]]></dc:creator><title><![CDATA[Health Center Emergency Response Exercise Set]]></title><link>https://hiteqcenter.org/Resources/Privacy-Security/HIT-Privacy-Security-Best-Practices/health-center-emergency-response-exercise-set</link><enclosure type="image/jpg" url="https://hiteqcenter.org/Portals/0/EasyDNNNews/2106/Pages-from-HITEQ_Emergency-preparedness-exercise-set_2025.png" length="82524"></enclosure><description><![CDATA[<img src="https://hiteqcenter.org/Portals/0/EasyDNNNews/2106/images/Pages-from-HITEQ_Emergency-preparedness-exercise-set_2025-300-300-p-L-97.png" alt="" /> The exercise cards in this set present scenarios and response-related questions designed to provide a quick (5–10 minute) method for health center staff to: Refresh knowledge of the content in their ...]]></description><pubDate>Wed, 19 Mar 2025 21:17:00 GMT</pubDate><guid>https://hiteqcenter.org/Resources/Privacy-Security/HIT-Privacy-Security-Best-Practices/health-center-emergency-response-exercise-set</guid><dc:identifier><![CDATA[55de2fef-80e6-4c14-8972-bc1560005dd4-2106]]></dc:identifier></item><item><dc:creator><![CDATA[Molly Rafferty]]></dc:creator><title><![CDATA[A Practical Guide on Intimate Partner Violence, Human Trafficking, and Exploitation and Technology Tools]]></title><link>https://hiteqcenter.org/Resources/Privacy-Security/HIT-Privacy-Security-Best-Practices/a-practical-guide-on-intimate-partner-violence-human-trafficking-and-exploitation-and-technology-tools</link><enclosure type="image/jpg" url="https://hiteqcenter.org/Portals/0/EasyDNNNews/2093/Pages-from-HITEQ_Guide-on-Intimate-Partner-Violence_2024.png" length="184339"></enclosure><description><![CDATA[<img src="https://hiteqcenter.org/Portals/0/EasyDNNNews/2093/images/Pages-from-HITEQ_Guide-on-Intimate-Partner-Violence_2024-300-300-p-L-97.png" alt="" />   This practical guide features key tools and principles to help health centers (HCs) develop safe documentation for intimate partner violence, human trafficking, and exploitation (IPV/HT/E) in ...]]></description><pubDate>Wed, 15 Jan 2025 16:50:00 GMT</pubDate><guid>https://hiteqcenter.org/Resources/Privacy-Security/HIT-Privacy-Security-Best-Practices/a-practical-guide-on-intimate-partner-violence-human-trafficking-and-exploitation-and-technology-tools</guid><dc:identifier><![CDATA[55de2fef-80e6-4c14-8972-bc1560005dd4-2093]]></dc:identifier></item><item><dc:creator><![CDATA[Molly Rafferty]]></dc:creator><title><![CDATA[Health Center Resilience in the Face of Cyber Adversity]]></title><link>https://hiteqcenter.org/Resources/Privacy-Security/HIT-Privacy-Security-Best-Practices/health-center-resilience-in-the-face-of-cyber-adversity</link><enclosure type="image/jpg" url="https://hiteqcenter.org/Portals/0/EasyDNNNews/2046/Cover-image2.png" length="1043293"></enclosure><description><![CDATA[<img src="https://hiteqcenter.org/Portals/0/EasyDNNNews/2046/images/Cover-image2-300-300-p-L-97.png" alt="" />The use of ransomware — malicious software that restricts access to computer systems with financial demands — has escalated, targeting health centers and putting countless lives at risk. This dire ...]]></description><pubDate>Wed, 21 Feb 2024 23:01:00 GMT</pubDate><guid>https://hiteqcenter.org/Resources/Privacy-Security/HIT-Privacy-Security-Best-Practices/health-center-resilience-in-the-face-of-cyber-adversity</guid><dc:identifier><![CDATA[55de2fef-80e6-4c14-8972-bc1560005dd4-2046]]></dc:identifier></item><item><dc:creator><![CDATA[Molly Rafferty]]></dc:creator><title><![CDATA[Navigating Compliance Challenges with the Information Blocking Rule: A Collection of Case Studies]]></title><link>https://hiteqcenter.org/Resources/Privacy-Security/HIT-Privacy-Security-Best-Practices/navigating-compliance-challenges-with-the-information-blocking-rule-a-collection-of-case-studies</link><enclosure type="image/jpg" url="https://hiteqcenter.org/Portals/0/EasyDNNNews/2027/Pages-from-remediated-HITEQ_Compliance-Case-Studies_2023.png" length="980878"></enclosure><description><![CDATA[<img src="https://hiteqcenter.org/Portals/0/EasyDNNNews/2027/images/Pages-from-remediated-HITEQ_Compliance-Case-Studies_2023-300-300-p-L-97.png" alt="" /> The Office of the National Coordinator for Health Information Technology’s (ONC) 21st Century Cures Act Information Blocking Rule (Info Blocking Rule) prohibits covered actors – including health ...]]></description><pubDate>Mon, 25 Sep 2023 21:00:00 GMT</pubDate><guid>https://hiteqcenter.org/Resources/Privacy-Security/HIT-Privacy-Security-Best-Practices/navigating-compliance-challenges-with-the-information-blocking-rule-a-collection-of-case-studies</guid><dc:identifier><![CDATA[55de2fef-80e6-4c14-8972-bc1560005dd4-2027]]></dc:identifier></item><item><dc:creator><![CDATA[Molly Rafferty]]></dc:creator><title><![CDATA[Health Center Guidelines for Implementing FHIR and the Information Blocking Rule]]></title><link>https://hiteqcenter.org/Resources/Privacy-Security/HIT-Privacy-Security-Best-Practices/health-center-guidelines-for-implementing-fhir-and-the-information-blocking-rule</link><enclosure type="image/jpg" url="https://hiteqcenter.org/Portals/0/EasyDNNNews/2025/iStock-1477483038cropped.jpg" length="4516718"></enclosure><description><![CDATA[<img src="https://hiteqcenter.org/Portals/0/EasyDNNNews/2025/images/iStock-1477483038cropped-300-300-p-L-97.jpg" alt="" />   This resource provides guidance to health centers for implementing FHIR in compliance with the Information Blocking Rule.     ]]></description><pubDate>Wed, 06 Sep 2023 15:48:00 GMT</pubDate><guid>https://hiteqcenter.org/Resources/Privacy-Security/HIT-Privacy-Security-Best-Practices/health-center-guidelines-for-implementing-fhir-and-the-information-blocking-rule</guid><dc:identifier><![CDATA[55de2fef-80e6-4c14-8972-bc1560005dd4-2025]]></dc:identifier></item><item><dc:creator><![CDATA[Nathan Botts]]></dc:creator><title><![CDATA[Promoting Cybersecurity Awareness for Patients]]></title><link>https://hiteqcenter.org/Resources/Privacy-Security/HIT-Privacy-Security-Best-Practices/promoting-cybersecurity-awareness-for-patients</link><enclosure type="image/jpg" url="https://hiteqcenter.org/Portals/0/EasyDNNNews/2008/Resource-Cover-Image.png" length="796404"></enclosure><description><![CDATA[<img src="https://hiteqcenter.org/Portals/0/EasyDNNNews/2008/images/Resource-Cover-Image-300-300-p-L-97.png" alt="" /> This training guide provides patients with knowledge and awareness about cybersecurity threats to protect their personal health data and to minimize risks from computer viruses and malware. ]]></description><pubDate>Fri, 30 Jun 2023 15:16:00 GMT</pubDate><guid>https://hiteqcenter.org/Resources/Privacy-Security/HIT-Privacy-Security-Best-Practices/promoting-cybersecurity-awareness-for-patients</guid><dc:identifier><![CDATA[55de2fef-80e6-4c14-8972-bc1560005dd4-2008]]></dc:identifier></item><item><dc:creator><![CDATA[Nye Day]]></dc:creator><title><![CDATA[Keeping the Pediatric PHI Secure: Using the Security Risk Assessment Tool]]></title><link>https://hiteqcenter.org/Resources/Privacy-Security/HIT-Privacy-Security-Best-Practices/keeping-the-pediatric-phi-secure-using-the-security-risk-assessment-tool</link><enclosure type="image/jpg" url="https://hiteqcenter.org/Portals/0/EasyDNNNews/1964/webex-logo.jpg" length="26041"></enclosure><description><![CDATA[<img src="https://hiteqcenter.org/Portals/0/EasyDNNNews/1964/images/webex-logo-300-300-p-L-97.jpg" alt="" /> This webinar discussed the importance and unique considerations for cyberthreats in pediatric health care settings, followed by a Security Risk Assessment (SRA) Tool walkthrough. ]]></description><pubDate>Mon, 21 Nov 2022 20:43:00 GMT</pubDate><guid>https://hiteqcenter.org/Resources/Privacy-Security/HIT-Privacy-Security-Best-Practices/keeping-the-pediatric-phi-secure-using-the-security-risk-assessment-tool</guid><dc:identifier><![CDATA[55de2fef-80e6-4c14-8972-bc1560005dd4-1964-]]></dc:identifier><ev:startdate>2022-11-16T17:00:00</ev:startdate><ev:enddate>2022-11-16T18:00:00</ev:enddate></item><item><dc:creator><![CDATA[Molly Rafferty]]></dc:creator><title><![CDATA[SAMHSA 42 CFR Part 2 Revised Rule]]></title><link>https://hiteqcenter.org/Resources/Privacy-Security/HIT-Privacy-Security-Best-Practices/samhsa-42-cfr-part-2-revised-rule</link><enclosure type="image/jpg" url="https://hiteqcenter.org/Portals/0/EasyDNNNews/1766/img-HITEQ-Highlights-image1.png" length="19471"></enclosure><description><![CDATA[<img src="https://hiteqcenter.org/Portals/0/EasyDNNNews/1766/images/img-HITEQ-Highlights-image1-300-300-p-L-97.png" alt="" /> New guidelines from SAMHSA released in July 2020 are designed to improve coordination of care for patients in treatment for substance disorder, while protecting confidentiality against unauthorized ...]]></description><pubDate>Wed, 09 Dec 2020 22:11:00 GMT</pubDate><guid>https://hiteqcenter.org/Resources/Privacy-Security/HIT-Privacy-Security-Best-Practices/samhsa-42-cfr-part-2-revised-rule</guid><dc:identifier><![CDATA[55de2fef-80e6-4c14-8972-bc1560005dd4-1766-]]></dc:identifier><ev:startdate>2021-01-19T19:00:00</ev:startdate><ev:enddate>2021-01-19T20:00:00</ev:enddate></item></channel></rss>