Recent Articles

  • What is 45 CFR 164.524? Rules for Individual Access to PHI

    Published On: November 2nd, 2017

    45 CFR 164.524 is a section of the HIPAA Privacy Rule that explains the standards regarding patient access to protected health information (PHI). PHI is any demographic information that [...]

  • The HIPAA Safeguards Your Practice Needs

    Published On: October 31st, 2017

    Chances are, your organization already has some sort of a HIPAA compliance program in place. But is it doing enough? How confident are you that your organization could pass [...]

  • Healthcare Cybersecurity Concerns Grow Amid Ransomware Threats

    Published On: October 27th, 2017

    For healthcare, cybersecurity threats are a growing risk to running a successful business. With cybersecurity and ransomware incidents making headlines day after day, healthcare providers need [...]

  • HIPAA Compliance Checklist 2018

    Published On: October 11th, 2017

    Looking for a HIPAA compliance checklist for 2018 that works for your business? We've got you covered. Compliancy Group's annual HIPAA compliance checklist includes a full rundown of everything [...]

  • Is DropBox HIPAA Compliant?

    Published On: October 6th, 2017

    The question "Is DropBox HIPAA compliant?" is a common question for healthcare providers and organizations that deal with protected health information (PHI). Before we answer, let's take a brief [...]

  • Getting Your Google BAA: What You Need to Know

    Published On: September 22nd, 2017

    When using Google to run your healthcare business you need to ensure that you sign a proper Google BAA. A BAA--or Business Associate Agreement--is a HIPAA mandated [...]

Blog Categories

  • 42 CFR Part 2

    42 CFR Part 2 dictates rules for the confidentiality of substance abuse records. Find out when providers are permitted to share records and when they are not.

  • Healthcare Compliance

    Healthcare compliance is complex, especially when you have to meet multiple compliance standards. Learn how to navigate HIPAA, OSHA, and SOC 2 requirements.

  • Healthcare Data Breach Report

    Each month, we review what caused healthcare data breaches and how they could have been prevented. Learn how to protect your business from breaches and fines.

  • HIPAA Compliance

    Whether you’re a healthcare provider, health plan, or healthcare vendor, you must meet HIPAA standards. Learn what’s required for HIPAA compliance and how to implement a successful program.

  • HIPAA News

    Keep up to date on HIPAA news by checking in with us. We will provide you with information on changes to HIPAA law, healthcare breaches, HIPAA violations, and OCR fines.

  • HIPAA Violation Fines

    Healthcare organizations that fail to meet HIPAA Privacy, Security, or Breach Notification Rules can face HIPAA violation fines. Find out who has been fined and how they could have prevented penalties.

  • MACRA MIPS

    To be eligible for reimbursement under the Merit-based Incentive Payment System (MIPS), you must meet Medicare Access and CHIP Reauthorization Act (MACRA) standards.

  • OCR Enforcement

    The Office for Civil Rights (OCR) is the enforcing body of HIPAA. The OCR conducts investigations into potential HIPAA violations, issuing judgments that can result in settlements.

  • OIG Compliance

    The Office of Inspector General (OIG) released guidance, referred to as the seven elements of compliance. Find out how to implement an effective compliance program.

  • OSHA Healthcare Compliance

    OSHA healthcare compliance ensures a safe and healthy environment for patients and staff. Find out how to meet various OSHA standards specific to healthcare.

  • Right of Access

    The HIPAA Right of Access standard requires healthcare providers to comply with patient record requests. This standard is the most cited in HIPAA settlements. Learn the rules.

  • SOC 2 Compliance

    The American Institute of Certified Public Accountants (AICPA) created a cybersecurity framework called Service Organization Control Type 2 (SOC 2). Learn how about SOC 2 compliance.