Recent Articles

  • California HIPAA Fine Concludes All-Time Record Year for HIPAA Enforcement

    Published On: February 13th, 2019

    HIPAA enforcement activity reached an all-time record in 2018, according to The Office for Civil Rights (OCR) at the U.S. Department of Health and Human Services (HHS). In 2018, [...]

  • Social Media HIPAA Violations: When Can a Provider Disclose PHI?

    Published On: February 6th, 2019

    Social media HIPAA violations are becoming a more common occurrence, especially in today's increasingly digital healthcare landscape. With news stories of social media HIPAA violations making headlines [...]

  • Indiana Healthcare Group Hit by Third-Party Data Breach

    Published On: February 1st, 2019

    The protected health information (PHI) of more than 30,000 US patients may have been exposed in a data breach involving Managed Health Services (MHS) of Indiana. [...]

  • HHS OCR Sets Health Information Privacy as 2019 Priority

    Published On: January 22nd, 2019

    Cybersecurity and data privacy have become increasingly critical issues facing healthcare over the past few years, and it seems that HHS OCR is ready to respond. The Department of [...]

  • How to Maintain HIPAA Compliance in Deskbound Technology

    Published On: January 16th, 2019

    HIPAA compliance must be improved in the cloud but also be optimized in deskbound technology. You can take steps toward compliance through improvements of your security [...]

  • What Are the HIPAA Administrative Simplification Rules?

    Published On: November 21st, 2018

    The HIPAA Administrative Simplification Rules establish national standards for electronic transactions and HIPAA code sets to maintain the privacy and security of protected health information (PHI). [...]

Blog Categories

  • 42 CFR Part 2

    42 CFR Part 2 dictates rules for the confidentiality of substance abuse records. Find out when providers are permitted to share records and when they are not.

  • Healthcare Compliance

    Healthcare compliance is complex, especially when you have to meet multiple compliance standards. Learn how to navigate HIPAA, OSHA, and SOC 2 requirements.

  • Healthcare Data Breach Report

    Each month, we review what caused healthcare data breaches and how they could have been prevented. Learn how to protect your business from breaches and fines.

  • HIPAA Compliance

    Whether you’re a healthcare provider, health plan, or healthcare vendor, you must meet HIPAA standards. Learn what’s required for HIPAA compliance and how to implement a successful program.

  • HIPAA News

    Keep up to date on HIPAA news by checking in with us. We will provide you with information on changes to HIPAA law, healthcare breaches, HIPAA violations, and OCR fines.

  • HIPAA Violation Fines

    Healthcare organizations that fail to meet HIPAA Privacy, Security, or Breach Notification Rules can face HIPAA violation fines. Find out who has been fined and how they could have prevented penalties.

  • MACRA MIPS

    To be eligible for reimbursement under the Merit-based Incentive Payment System (MIPS), you must meet Medicare Access and CHIP Reauthorization Act (MACRA) standards.

  • OCR Enforcement

    The Office for Civil Rights (OCR) is the enforcing body of HIPAA. The OCR conducts investigations into potential HIPAA violations, issuing judgments that can result in settlements.

  • OIG Compliance

    The Office of Inspector General (OIG) released guidance, referred to as the seven elements of compliance. Find out how to implement an effective compliance program.

  • OSHA Healthcare Compliance

    OSHA healthcare compliance ensures a safe and healthy environment for patients and staff. Find out how to meet various OSHA standards specific to healthcare.

  • Right of Access

    The HIPAA Right of Access standard requires healthcare providers to comply with patient record requests. This standard is the most cited in HIPAA settlements. Learn the rules.

  • SOC 2 Compliance

    The American Institute of Certified Public Accountants (AICPA) created a cybersecurity framework called Service Organization Control Type 2 (SOC 2). Learn how about SOC 2 compliance.