The HIPAA compliant resources on this page will give you the advantage you need to start to assess the status of your compliance. Our free tools and educational resources come from the top HIPAA experts in the country who are working with us to help you succeed. Please feel free to download and utilize our HIPAA compliant resources – and to contact us directly if you have any questions about becoming HIPAA compliant.
Stay Updated on the Latest HIPAA News
6 Tips to Protect Your Practice from a Data Breach
The HIPAA Breach Notification Rule requires HIPAA covered entities and their business associates to provide notification following a breach of unsecured protected health information (PHI). 6 tips to protect your practice from a data [...]
5,800 Affected by Business Associate Email Breach
An email breach at Magellan National Imaging Associates claims another covered entity victim, Geisinger Health Plan. Magellan, hired by the health plan to manage their radiology benefits, discovered on July 5 [...]
What is Required for Proper PHI(Protected Health Information) Disposal?
The HIPAA Privacy Rule requires that covered entities apply appropriate safeguards to protect the privacy of protected health information (PHI). The required safeguards include: Administrative safeguards Physical safeguards [...]
9,700 Patients Affected by Healthcare Breach
Shore Speciality Consultants Pulmonology Group notified 9,700 patients in breach notification letters that their protected health information (PHI) may have been compromised. On July 8, 2019 the Group discovered that their network server was [...]
What is the National Patient Identifier Repeal Act?
When HIPAA was enacted in 1996, the law called for development of a unique patient identifier (sometimes referred to as a “national patient identifier”). In 1999, Congress passed legislation prohibiting the [...]
HIPAA Firewall Controls
The HIPAA Security Rule and HIPAA Firewall Controls Under the technical safeguard requirements of the HIPAA Security Rule, covered entities must implement policies and procedures to protect electronic protected health information [...]

















