Risk Assessment Videos
This 8-minute Security Risk Analysis video explains a security management process. This 6-minute video explains what a contingency plan is, why you need it,
This 8-minute Security Risk Analysis video explains a security management process. This 6-minute video explains what a contingency plan is, why you need it,
For HIPAA Compliance Step 1: Prove you are a covered entity If you are unsure if you are a covered entity, submit an inquiry to
Patients who believe their Protected Health Information (PHI) has been breached can file a complaint with federal Office of Civil Rights(OCR). OCR may investigate complaints
Think of “Meaningful Use” as the federal government’s proverbial carrot-or-stick approach to driving a data-driven electronic health system. The carrot: Those who meet benchmarks
A Business Associate is a person or organization, other than an employee of a covered entity, who performs functions or provides services related to creating,
Give patients the opportunity to discuss the confidentiality and security of PHI, and make sure they know how to report concerns or discoveries of breaches.
To safeguard patient health information, workers must know how to implement policies, procedures, and security audits. HIPAA requires the workforce to be trained on
Implement your action plan. Implementation is about making HIPAA compliance a daily priority. That means adhering to HIPAA policies and procedures, and doing everything
Using your risk analysis results, develop a plan to mitigate the identified risks. As The Department of Health & Human Services points out, basic
This is among the most important aspects of HIPAA compliance. Think ahead about ways someone, or some group, might compromise files or databases containing