Manage any federal, state and local compliance regulation
Manage high volume third party vendor risk management programs
Manage by exception with filtering, alerts, notifications, and a simple user interface
Mobilize your audit teams with ComplyAssistantMobile
We focus on information security audits that cover all control standards, identify gaps, and deliver a holistic risk mitigation roadmap.
All audit results are delivered in our compliance management software portal, not a spreadsheet
Our consultants are seasoned subject matter experts, not juniors
We are engaged by clients across the country and can provide excellent referrals upon request
Our healthcare compliance software is used by managed service providers (MSPs) who provide general IT and HIPAA services to their clients.
Using unstructured tools makes the management of client audits difficult
Provides your organization with a better way to manage your clients higher volume business associate audits
Manage your clients by exception with extensive filters, automated alerts, and notifications
MD-COP is a comprehensive offering specifically designed to protect medical devices deployed in healthcare provider settings. The MD-COP solutions provide hospitals with a dedicated security operations center, medical device breach detection system, medical device cybersecurity risk assessment, medical device cybersecurity policy, medical device manufacturer risk assessment and scoring, on-going threat intelligence and medical device cybersecurity best practices.
This is a Business Associate Agreement / Contract Addendum template for the requirements of the HITECH Act of 2009 in Microsoft Word format. Use it as a starting point and customize to meet the requirements for your business associates agreements.HIPAA Privacy and Security Proactive Audits Tool Kit
Contains recommended HIPAA Privacy and Security audits that your organization should consider implementing for policies & procedures, proactive information system activity review, and facility walk throughs.HIPAA Facility Security Walkthrough Checklist
Excellent guidance for auditing facilities that contain protected health information. Simply check the boxes and write notes as you conduct your walk-through audit.
Medical device cybersecurity has become significantly more important in the age of digital health. There are essential actions health systems must take to protect themselves – and their patients. This blog offers 5 guidelines to evaluate and maintain your medical device cybersecurity.From 300 to 36: Reducing Hurdles in Business Associate Assessments
Business associate assessments are notoriously burdensome and time consuming for both covered entity and the business associate (BA). But the typical 300-question survey can be significantly narrowed by focusing on the most critical and problematic issues.HIPAA and Social Media – The Need for Policies and Training
Healthcare organizations and their third party vendors have an obligation to the federal government and their patients to abide by the HIPAA regulations. Unfortunately the very foundation of social media opposes everything in relation to the privacy, security, and confidentiality of information. Social media allows for anyone to see your organizations information, at any time, in any part of the world.
The General Data Protection Regulation (GDPR) is the European Union (EU) regulation on privacy and security of personally identifiable information (PII). It goes into effect on May 25, 2018. This blog provides an important comparison between GDPR and HIPAA.Third Party (BA) Contract and Privacy and Security Risk Management
The HITECH-OMNIBUS final rule stepped up the requirements and for both CEs and BAs and both must now include the new requirements in their information privacy and security risk analysis and management program.Business Intelligence and Big Data – What are the HIPAA Privacy and Security Impacts?
Since we are talking about healthcare information we must talk about protected health information (PHI) and the HIPAA-HITECH-OMNIBUS Privacy, Security, and Breach Notification Rules. BI and Big Data analysis that includes PHI and its use and disclosure must be reviewed against the HIPAA security and privacy requirements and the breach notification requirements.