Recent Articles

  • Medical Device Cybersecurity Issues Found in GE Devices

    Published On: December 14th, 2020

    A new cybersecurity flaw in GE imaging and ultrasound devices was discovered by CyberMDX. The flaw potentially allows unauthorized individuals remote access to the devices. More details on the [...]

  • Criminal Scheme Leads to HIPAA Criminal Penalties

    Published On: December 11th, 2020

    Three individuals allegedly gained unauthorized access to a healthcare provider’s electronic health record (EHR) platform with the intent to steal and sell protected health information (PHI). Two separate schemes, [...]

  • November Healthcare Breaches Affect 1.15 Million Patients

    Published On: December 10th, 2020

    Each month we provide an overview of the healthcare breaches occurring in the previous month. In November, healthcare breaches affected 1,157,813 patients. November healthcare breaches are discussed below. The [...]

  • Is Help Scout HIPAA Compliant?

    Published On: December 9th, 2020

    Help Scout is a software provider that offers help desk services including a knowledge base and customer support platform. But is Help Scout HIPAA compliant? The answer is discussed [...]

  • EHR Vendor Breach Inadvertently Exposed Patient Files

    Published On: December 8th, 2020

    NTreatment, an electronic medical record vendor, accidentally exposed thousands of patient files by failing to password protect one of its cloud servers. The details of the EHR vendor breach [...]

  • HIPAA and COVID: Is Violating HIPAA a Crime?

    Published On: December 7th, 2020

    A recent federal lawsuit in Virginia illustrates both how far an employer can go in asking employees about COVID-19 diagnosis, as well as how far HIPAA law prevents such [...]

Blog Categories

  • 42 CFR Part 2

    42 CFR Part 2 dictates rules for the confidentiality of substance abuse records. Find out when providers are permitted to share records and when they are not.

  • Healthcare Compliance

    Healthcare compliance is complex, especially when you have to meet multiple compliance standards. Learn how to navigate HIPAA, OSHA, and SOC 2 requirements.

  • Healthcare Data Breach Report

    Each month, we review what caused healthcare data breaches and how they could have been prevented. Learn how to protect your business from breaches and fines.

  • HIPAA Compliance

    Whether you’re a healthcare provider, health plan, or healthcare vendor, you must meet HIPAA standards. Learn what’s required for HIPAA compliance and how to implement a successful program.

  • HIPAA News

    Keep up to date on HIPAA news by checking in with us. We will provide you with information on changes to HIPAA law, healthcare breaches, HIPAA violations, and OCR fines.

  • HIPAA Violation Fines

    Healthcare organizations that fail to meet HIPAA Privacy, Security, or Breach Notification Rules can face HIPAA violation fines. Find out who has been fined and how they could have prevented penalties.

  • MACRA MIPS

    To be eligible for reimbursement under the Merit-based Incentive Payment System (MIPS), you must meet Medicare Access and CHIP Reauthorization Act (MACRA) standards.

  • OCR Enforcement

    The Office for Civil Rights (OCR) is the enforcing body of HIPAA. The OCR conducts investigations into potential HIPAA violations, issuing judgments that can result in settlements.

  • OIG Compliance

    The Office of Inspector General (OIG) released guidance, referred to as the seven elements of compliance. Find out how to implement an effective compliance program.

  • OSHA Healthcare Compliance

    OSHA healthcare compliance ensures a safe and healthy environment for patients and staff. Find out how to meet various OSHA standards specific to healthcare.

  • Right of Access

    The HIPAA Right of Access standard requires healthcare providers to comply with patient record requests. This standard is the most cited in HIPAA settlements. Learn the rules.

  • SOC 2 Compliance

    The American Institute of Certified Public Accountants (AICPA) created a cybersecurity framework called Service Organization Control Type 2 (SOC 2). Learn how about SOC 2 compliance.