Our risk management and healthcare compliance software can help you meet your compliance and security needs.
Manage any federal, state and local compliance regulation.
Manage your assessment and response to the COVID-19 pandemic.
Manage a high volume of third-party vendor risk management programs
Manage by exception with filtering, alerts and notifications – all in a simple user interface.
Mobilize your audit teams with our mobile application free trial.
We focus on information security audits to cover all control standards, identify gaps and deliver a holistic risk mitigation roadmap.
Our healthcare compliance consultants are seasoned subject matter experts who provide unbiased reviews.
We perform both internal and external risk assessments and security audits.
All audit results are delivered in our compliance management software portal, not in a spreadsheet.
Our consultants provide a directive action plan as part of your roadmap.
Managed service providers (MSPs) use our compliance management software to provide general IT and HIPAA services to their clients.
Easily manage a high volume of client audits with a structured tool.
Administer third-party risk management programs.
Manage your clients by exception with extensive filters, automated alerts and notifications.
Provide clients with secure access to their own documents and reports.
"ComplyAssistant’s cloud-based software solution allowed us to efficiently and effectively manage the entire compliance process, from assessment development and distribution through management of action items." --CIO
This is a HIPAA Business Associate Agreement / Contract Addendum template for the requirements of the HITECH Act of 2009 in Microsoft Word format. Use it as a starting point and customize to meet the requirements for your business associates agreements.HIPAA Privacy and Security Proactive Audits Tool Kit
Contains recommended HIPAA Privacy and Security audits that your organization should consider implementing for policies & procedures, proactive information system activity review, and facility walk throughs.HIPAA Facility Security Walkthrough Checklist
Excellent guidance for auditing facilities that contain protected health information. Simply check the boxes and write notes as you conduct your walk-through audit.
Even prior to the COVID-19 pandemic, ransomware attacks were on the rise. “COVID has simply increased risk of attacks due to more locations with a remote workforce, [protected health information] through telehealth, more phishing attacks, more opportunities that hackers like to take advantage of.”Sharing Patient Information: Pros, Cons and Implications
The news late last year around Project Nightingale aroused interest from both healthcare organizations and the public on how and when protected health information (PHI) should be shared. With new technologies, new entrants to the healthcare market, how can healthcare providers balance HIPAA, cybersecurity protections, and the need to easily share data to improve patient care?Keeping Networks Secure In The Age Of Telecommuting
Though telecommuting was on already on the rise at a rate of 2-3% per year, the COVID-19 pandemic required healthcare organizations to re-evaluate work from home policies and quickly enable a remote workforce. But, in the midst of a pandemic, when you have to act as quickly as possible, how do you also make sure your networks and operations are still protected?
Originally designed as part of HITECH to encourage providers to adopt electronic health records (EHRs), meaningful use was a means to an end – towards improved population health and better patient care among fragmented providers. The program prioritized five pillars of health outcomes:GDPR Impact on U.S. Healthcare Organizations
The General Data Protection Regulation (GDPR) is the European Union (EU) regulation on privacy and security of personally identifiable information (PII). It goes into effect on May 25, 2018. This blog provides an important comparison between GDPR and HIPAA.Third Party (BA) Contract and Privacy and Security Risk Management
The HITECH-OMNIBUS final rule stepped up the requirements and for both CEs and BAs and both must now include the new requirements in their information privacy and security risk analysis and management program.