• search
Helping Organizations Achieve HIPAA Compliance ™
Call Today: (800) 733-6379

HIPAA Compliance Blog

HELPING ORGANIZATIONS ACHIEVE HIPAA COMPLIANCE rss


Highlights from the 2018 HIPAA Security Conference: Audit Processes, Cyberattacks and Ransomware Responses, and Breach Posting

by ih-coc admin
At the HIPAA Security Conference in DC that took place on October 18 & 19, 2018, one of the most valued speakers, Serena Mosley-Day, Acting Senior Advisor Compliance and Enforcement, HHS Office for Civil Rights.

Everyone Onboard: Applying the “Outbreak Prevention” Approach to PHI and ePHI

by ih-coc admin
Most expenditures undertaken by covered entities and/or their business associates to ensure compliance with the HIPAA Security Rule are related to network security, data storage, and endpoint access.

Does your HIPAA-Compliant Vendor Actually Practice Compliance?

by ih-coc admin
According to HIPAA mandates, a third party that engages with PHI or ePHI through the services it is contracted to provide to the covering entity (for example, a clinic, medical support, social services, or health organization) is considered a business associate.

Two HIPAA-Related Reminders for the Start of this School Year

by ih-coc admin
In the throes of the back to school rush, it is easy for parents and guardians to forget about the impacts and function of HIPAA privacy and security safeguards and their attendant risks, which take place when those same safeguards are ignored or under/over-utilized.

HIPAA Security Rule Implications for the use of Smart Devices when Accessing ePHI Information

by ih-coc admin
Accessing ePHI on smart devices, no matter how dire the circumstances, must be considered a potential risk, and should only be undertaken after safeguards in line with the HIPAA security rule are put into place, so as to minimize running the risk of patient privacy violations, or worse, an actual security breach.