<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

Top 3 Tips For Security and Privacy In Telehealth

Currently, the entire globe is experiencing its universal lockdown. With the looming threat of COVID-19, people have[…]

Understanding HIPAA PHI Accounting of Disclosure Requirements

HIPAA (Health Insurance Portability & Accountability Act) keeps a check on all medical practices and insurance[…]

Achieving HIPAA Compliance: Your Guide to Properly Disposing of PHI Hardware

Healthcare organizations upgrade their electronic devices and hardware all the time. Newer, more sophisticated[…]

Is it time for your Annual HIPAA Risk Assessment?

Table of Contents: Is it time for your Annual HIPAA Risk Assessment? Top 5 actions you can take to prepare for your[…]

10 Steps to help prevent Breaches of PHI

You may have heard of healthcare organizations struggling to comply with HIPAA. The Health Insurance Portability[…]

How you can obtain access to your Protected Health Information (PHI)

Have you ever wanted to dig deep into all your Protected Health Information (PHI) and see what information the doctors[…]

Are you accidentally disclosing patient information?

If you are accidentally disclosing Patient information, also known as PHI, you are causing a data breach for your[…]

Do Dentists Need To Comply With HIPAA?

In April 2018, a dental office in New Jersey, Michael Gruber, DMD, PA reported that their computers were hacked and[…]

Understanding the HIPAA Security Rule: Part III – Administrative Safeguards

In the final post of this blog series, we will cover the Administrative Safeguards required for covered entities as set[…]

Understanding the HIPAA Security Rule: Part II - Technical Safeguards

Welcome to Part II of this series regarding the HIPAA Security rule. As a reminder, the HIPAA Security Rule is broken[…]
Subscribe to our Blog!