<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

10 Steps to help prevent Breaches of PHI

You may have heard of healthcare organizations struggling to comply with HIPAA. The Health Insurance Portability[…]

How you can obtain access to your Protected Health Information (PHI)

Have you ever wanted to dig deep into all your Protected Health Information (PHI) and see what information the doctors[…]

Are you accidentally disclosing patient information?

If you are accidentally disclosing Patient information, also known as PHI, you are causing a data breach for your[…]

Understanding the HIPAA Security Rule: Part II - Technical Safeguards

Welcome to Part II of this series regarding the HIPAA Security rule. As a reminder, the HIPAA Security Rule is broken[…]

Understanding the HIPAA Security Rule: Part I - HIPAA Physical Safeguards

While HIPAA covers a broad scope of healthcare related items, its Security Rule specifically sets forth standards[…]

HIPAA Regulations at a Glance

Wouldn't you like to have HIPAA regulations at a glance which you can consistently keep in your office as a reference?[…]

HIPAA enforcement trends - What is OCR doing?

Iliana Peters recently provided a thorough update of HIPAA enforcement trends as well as a road map to OCR’s current[…]

Security and Privacy for Telemedicine

Security and Privacy for Telemedicine Telemedicine is taking the medical world by storm. And one can easily see why.[…]

HIPAA OCR Enforcement Actions against Business Associates

HHS’ Office for Civil Rights is responsible for enforcing the Privacy and Security Rules on HIPAA covered entities.[…]

OCR Announces Launch of Phase 2 of 2016 HIPAA Audit Program

A new round of federal privacy and security audits will target the covered entities along with their business[…]
Subscribe to our Blog!