Recent Articles

  • 122,000 Patients Affected by PHI Breach

    Published On: September 4th, 2019

    Providence Health Plan, a dental program in Oregon, may have experienced a PHI breach that risked the protected health information (PHI) of 122,000 patients. The breach was a result [...]

  • UCMC and Google File Motion to Dismiss HIPAA Privacy Lawsuit

    Published On: September 3rd, 2019

    In late June of 2019, a class action lawsuit was filed against the University of Chicago Medical Center (UCMC) and Google. In this HIPAA Privacy lawsuit, [...]

  • HIPAA Security Risk Analysis Element 3: Assessing Current Security Measures

    Published On: September 3rd, 2019

    The HIPAA Security Rule requires that covered entities (health plans, healthcare clearinghouses, and healthcare providers who electronically transmit any health information in connection with a HIPAA related transaction), and [...]

  • July Healthcare Breaches Worst Month on Record

    Published On: August 30th, 2019

    The Department of Health and Human Services (HHS) began tracking data breaches in 2009. The HHS publishes meaningful breaches on their "wall of shame.” A meaningful breach affects 500 [...]

  • 3 Easy Steps to Get your Microsoft Business Associate Agreement

    Published On: August 29th, 2019

    The Health Insurance Portability and Accountability Act (HIPAA) set forth industry standards for the handling of protected health information (PHI). PHI is any individually identifying health information such as name, [...]

  • PHI Breaches Affect 9,466 Patients

    Published On: August 28th, 2019

    PHI breaches happen for a number of reasons, whether from human error or phishing attacks, PHI breaches should be a cause for concern for anyone working [...]

Blog Categories

  • 42 CFR Part 2

    42 CFR Part 2 dictates rules for the confidentiality of substance abuse records. Find out when providers are permitted to share records and when they are not.

  • Healthcare Compliance

    Healthcare compliance is complex, especially when you have to meet multiple compliance standards. Learn how to navigate HIPAA, OSHA, and SOC 2 requirements.

  • Healthcare Data Breach Report

    Each month, we review what caused healthcare data breaches and how they could have been prevented. Learn how to protect your business from breaches and fines.

  • HIPAA Compliance

    Whether you’re a healthcare provider, health plan, or healthcare vendor, you must meet HIPAA standards. Learn what’s required for HIPAA compliance and how to implement a successful program.

  • HIPAA News

    Keep up to date on HIPAA news by checking in with us. We will provide you with information on changes to HIPAA law, healthcare breaches, HIPAA violations, and OCR fines.

  • HIPAA Violation Fines

    Healthcare organizations that fail to meet HIPAA Privacy, Security, or Breach Notification Rules can face HIPAA violation fines. Find out who has been fined and how they could have prevented penalties.

  • MACRA MIPS

    To be eligible for reimbursement under the Merit-based Incentive Payment System (MIPS), you must meet Medicare Access and CHIP Reauthorization Act (MACRA) standards.

  • OCR Enforcement

    The Office for Civil Rights (OCR) is the enforcing body of HIPAA. The OCR conducts investigations into potential HIPAA violations, issuing judgments that can result in settlements.

  • OIG Compliance

    The Office of Inspector General (OIG) released guidance, referred to as the seven elements of compliance. Find out how to implement an effective compliance program.

  • OSHA Healthcare Compliance

    OSHA healthcare compliance ensures a safe and healthy environment for patients and staff. Find out how to meet various OSHA standards specific to healthcare.

  • Right of Access

    The HIPAA Right of Access standard requires healthcare providers to comply with patient record requests. This standard is the most cited in HIPAA settlements. Learn the rules.

  • SOC 2 Compliance

    The American Institute of Certified Public Accountants (AICPA) created a cybersecurity framework called Service Organization Control Type 2 (SOC 2). Learn how about SOC 2 compliance.