<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

Understanding HIPAA PHI Accounting of Disclosure Requirements

HIPAA (Health Insurance Portability & Accountability Act) keeps a check on all medical practices and insurance[…]

Breach Risk Analysis: A Four-Step Plan

Data breaches have long been a nuisance for many industries, including healthcare and financial services. In the age of[…]

Telehealth, Video Tech Tools and HIPAA Compliance

Telemedicine has been around for years, but as a healthcare service it has been underutilized. Today, virtual visits[…]

Does the HIPAA Privacy Rule apply to the Novel Coronavirus (COVID-19)?

The Novel Coronavirus is officially a global pandemic. The World Health Organization says that a pandemic is the[…]

Challenges and methods for securing Picture Archiving and Communication Systems (PACS)

Medical data is a valuable commodity for identity theft. Despite HIPAA privacy rules being in effect for more than two[…]

Secure Mobile Messaging in Healthcare: 4 Recommendations to Remain HIPAA Compliant

A research study, the State of Clinical Communication and Workflow in healthcare organizations, revealed that 51% of IT[…]

HIPAA Privacy Rules, Mental Health, and Addiction: When can PHI be shared without consent?

HIPAA is designed to protect patient confidentiality. What happens when patient confidentiality conflicts with a[…]

How to be HIPAA compliant on social media

Social media can be a minefield for any business to navigate. When it comes to the combination of patient privacy and[…]

OCR Priorities for 2019-2020

In the recent HIPAA conference organized by the Office for Civil Rights (OCR) and National Institute of Standards and[…]

6 Communication Tips to Regain Patient Trust After a Medical Record Breach

Even with a perfect cybersecurity strategy and implementation, including performing all required steps to be HIPAA[…]
Subscribe to our Blog!