Evaluate your agreements with tech companies like Google and Meta to make sure you are not allowing a pixel tracker to share patient data in violation of HIPAA.| The HIPAA E-Tool
Two healthcare cyberattacks, including one personal and one headline-making incident, highlight the damage cybercriminals can cause to patients. I learned about the first incident yesterday when my orthopedist called to cancel an after-care appointment that morning because their computer network was down due to a cyberattack. I haven't heard anything yet about a rescheduled appointment. [...]| The HIPAA E-Tool
EyeMed Vision Care, a company based in Ohio that offers vision benefits, has agreed to pay $5,000,000 to settle a class action lawsuit related to a healthcare data breach. This recent settlement marks the final resolution in a series of investigations and settlements totaling over $12.6 million. The issues began five years ago with a [...]| The HIPAA E-Tool
The top 5 HIPAA violations remain common among all sizes and kinds of healthcare organizations. Learn what they are and how to avoid them.| The HIPAA E-Tool
Enforcement of the Health Insurance Portability and Accountability Act (HIPAA) is a bipartisan mandate. Protecting the privacy of protected health information (PHI) has remained a priority for HIPAA under Trump. Cyber threats to healthcare have increased over the past decade, and accountability remains a top priority for regulators. Enforcement trends from the first Trump administration [...]| The HIPAA E-Tool
Learn the basic rules of HIPAA authorizations. When are they required, are there any exceptions, and what are the required elements?| The HIPAA E-Tool
A personal representative makes health care decisions for someone else - a significant role reserved for when an adult patient is incapacitated.| The HIPAA E-Tool
HIPAA balances privacy with the need for communication with family and friends in behavioral health treatment.| The HIPAA E-Tool
The HIPAA E-Tool software walks you step-by-step through the HIPAA Rules to protect patient privacy. Contact us and Get a free demo now!| The HIPAA E-Tool
Marketing and social media can be a minefield for healthcare providers. But HIPAA violations in marketing can be avoided. The most common HIPAA violation is the unauthorized disclosure of protected health information (PHI). This occurs in every facet of healthcare, whether in the office, working from home, in social situations, or online. It can happen [...]| The HIPAA E-Tool
Providers may talk with family and friends under HIPAA guidelines as long as the patient's wishes are respected.| The HIPAA E-Tool
The Office for Civil Rights (OCR) will assume responsibility for enforcing the “Confidentiality of Substance Use Disorder (SUD) Patient Records” regulations at 42 CFR part 2 (“Part 2”), which protect the privacy of patients’ SUD treatment records. The announcement was published in the Federal Register on August 26. The Part 2 regulations predate HIPAA and [...]| The HIPAA E-Tool
Another major hospital system has settled a class action lawsuit over the breach of patients' sensitive protected health information (PHI) on its MyChart portal. Mount Sinai Health System (Mount Sinai), the largest hospital network in New York City, will pay $5.26 million to settle claims. This is the second recent announcement by a major health [...]| The HIPAA E-Tool
Avoid costly audits and investigations with strong HIPAA compliance. OCR enforcement is focused on Risk Analysis and ransomware prevention.| The HIPAA E-Tool
OCR is looking at potential HIPAA violations caused by the use of website tracking technology in healthcare.| The HIPAA E-Tool
Staying ahead of the regulators requires an understanding of FTC consumer protection laws. FTC's mandate includes health privacy.| The HIPAA E-Tool
A jury decided that Meta violated California privacy law by using consumers' private health information for commercial purposes without consent.| The HIPAA E-Tool
BJC HealthCare is paying millions of dollars to settle a class action lawsuit over the use of web trackers on its websites and patient portal.| The HIPAA E-Tool
The Integrated Oncology Network was hacked via a phishing email in December and now faces HIPAA investigations and breach of privacy lawsuits.| The HIPAA E-Tool
Learn the basics of HIPAA breach notification - investigate, document, notify and report.| The HIPAA E-Tool
Medical identity theft is the fastest growing type of identity theft today. Use HIPAA compliance to outsmart the thieves.| The HIPAA E-Tool
Paying ransom is not a guaranteed solution and brings other risks, but disruption may be extreme, creating a terrible choice.| The HIPAA E-Tool
HIPAA is not going away but will continue to change under COVID-19, adapting to the needs of patients and to preserve privacy.| The HIPAA E-Tool
Healthcare providers need to communicate with a patient's loved ones. But how do you know what to share with a patient's family and friends and still remain HIPAA-compliant?| The HIPAA E-Tool
HIPAA isn't only about privacy. It's about the right of access to your own records. It should be easy, but too often patients' rights are blocked.| The HIPAA E-Tool
Access to medical records should be easy. Do not use a HIPAA Authorization form, or overcharge patients for copies if you want to comply with HIPAA. This is a hot button issue right now at the Office for Civil Rights (OCR) so it’s important to handle patients’ requests for their own records the right way.| The HIPAA E-Tool
Fix this common (avoidable) mistake. Learn how to handle requests for protected health information with a simple and definitive up-to-date guide.| The HIPAA E-Tool
Learn the core questions in a HIPAA Risk Analysis so you can make honest and useful risk assessments and a Risk Management Plan.| The HIPAA E-Tool
A Security Rule update is coming, and you can prepare now to get ahead of the changes by strengthening your cybersecurity practices today.| The HIPAA E-Tool
The HIPAA Compliance Officer is your company's HIPAA Team Leader. How do you select an officer and exactly what do they do?| The HIPAA E-Tool
Use business associate due diligence to ensure your HIPAA risk analysis is complete. Require HIPAA compliance and sign a BA agreement.| The HIPAA E-Tool
Protected health information is still one of the most widely misunderstood concepts in HIPAA. Examples and FAQs help explain PHI.| The HIPAA E-Tool
Learn more about HIPAA Risk Analysis and find out how to do it on your own. Take out the mystery and gain the confidence you need to manage your specific risks.| The HIPAA E-Tool
Know what a covered entity is under HIPAA - learn the basics and see answers to commonly asked questions that might surprise you.| The HIPAA E-Tool
The enormous growth in Telehealth has spurred an increase in emails and texts with patients - providers beware - you need to follow HIPAA.| The HIPAA E-Tool
Employees are the strongest defense but might also be the weakest link when it comes to HIPAA compliance. Learn how to help them do their best.| The HIPAA E-Tool
HIPAA requires a contingency plan to help prevent avoidable losses caused by disaster. Create one that fits your specific needs and reduces your risks.| The HIPAA E-Tool
Set yourself apart in the eyes of OCR and improve your protection of ePHI to avoid breaches, investigations and fines - create a HIPAA compliant IT inventory.| The HIPAA E-Tool
Behavioral health and small providers receive scrutiny in these recent HIPAA enforcement actions. Learn the right of access requirements and avoid fines.| The HIPAA E-Tool
Most organizations fail their HIPAA audit because they haven’t completed a HIPAA Risk Analysis. It’s a core HIPAA requirement but is often overlooked.| The HIPAA E-Tool
Even though Business Associates represent the largest group of professionals responsible for HIPAA compliance, they don't treat patients. Still, BAs face tremendous HIPAA scrutiny.| The HIPAA E-Tool
Review HIPAA authorization basics - learn when to obtain one from a patient, and how to respond if you receive one asking you for a patient's PHI.| The HIPAA E-Tool
Risk Analysis protects healthcare from cyber crime. Learn about the Security Rule Checklist, a critical, central part of Risk Analysis.| The HIPAA E-Tool
The HIPAA right of access is an OCR priority so providers should learn the simple rules to make access easy and fast.| The HIPAA E-Tool
The keys to success for HIPAA compliance start with four core concepts but expand to fit your unique situation. Seek improvement, not perfection.| The HIPAA E-Tool
This HIPAA training outline covers all the key topics and will boost your confidence, whether you are starting new or improving existing training.| The HIPAA E-Tool
The single most important thing a healthcare organization can do for HIPAA compliance is a Risk Analysis.| The HIPAA E-Tool
OCR is concerned about business associate compliance and sounds a wake-up call with a recent settlement mandating risk analysis and training.| The HIPAA E-Tool
Understanding the definition of PHI will help maintain patient privacy, strengthen HIPAA compliance, and avoid costly breaches and investigations.| The HIPAA E-Tool
HIPAA training needs to be fast and flexible - learn how to break it into steps and make it relevant to specific job duties for maximum benefit.| The HIPAA E-Tool
What happens without a strong HIPAA compliance program? If forced to settle with OCR, a Corrective Action Plan is expensive, time consuming and painful.| The HIPAA E-Tool