Blog

Author: Ken Reiher

ComplyAssistant Launches New Mobile Application for Healthcare Compliance

ComplyAssistant announced today the launch of its new mobile application to support risk management and healthcare compliance. The mobile application works in conjunction with ComplyAssistant’s leading governance, risk and compliance (GRC) software, enabling audit teams to become more efficient with managing, reporting and mitigating audit exceptions.

Visit ComplyAssistant in Las Vegas: April 15 – 18

ComplyAssistant executives Gerry Blass (President and CEO) and Ken J. Reiher (VP Operations) will be stationed at booth number 607 during the 22nd Annual Health Care Compliance Association (HCCA) National Conference.

Compliance Updates
GDPR Impact on US Healthcare Organizations

The General Data Protection Regulation (GDPR) is the European Union (EU) regulation on privacy and security of personally identifiable information (PII). It goes into effect on May 25, 2018. This blog provides an important comparison between GDPR and HIPAA.

HIPAA and Social Media – The Need for Policies and Training

Healthcare organizations and their third party vendors have an obligation to the federal government and their patients to abide by the HIPAA regulations. Unfortunately the very foundation of social media opposes everything in relation to the privacy, security, and confidentiality of information. Social media allows for anyone to see your organizations information, at any time, in any part of the world.

NJ HIMSS Free Webinar on Information Security Considerations in Regards to Population Health

Sept 21 2017 The webinar will focus on the evolution of Population Health, new technologies, and solutions that could impact information security, from IOT (internet of things) to the cloud, mobile devices to medical devices, personal apps and telemedicine, and more. It is a numbers game when considering increased risk from both internal threats and external attacks. Healthcare organizations must therefore conduct ongoing risk assessments to identify gaps and vulnerabilities that make identifiable health information prone to unauthorized access, both in transit and at rest.