Healthcare Compliance Updates & Tips

Checkout the latest regulatory compliance updates and tips from ComplyAssistant.
On top of our updates and tips we often publish free tools and webinars to help the compliance community.

November 8, 2012   |   Gerry Blass

The HITECH Omnibus final rule -“Fall” for IT

The HITECH Omnibus final rule -“Fall” for IT (Journal of Healthcare Information Management – (JHIM) –Fall 2012 – Used by permission from HIMSS). See you in September – That was a great song, first done by the Tempos in 1959 and then by the Happenings in 1966. So let’s use it as the theme for the current estimated timing for the publication of the HITECH Omnibus final rule. Of course, it could also be “Home for the Holidays”.

Keep reading...
August 19, 2012   |   Gerry Blass

Mobile Devices Are Here to Stay, But Challenges Remain

Mobile Devices Are Here to Stay, But Challenges Remain (Journal of Healthcare Information Management – (JHIM) – Summer 2012 – Used by permission from HIMSS). “The use of portable devices, especially the iPhone and iPad are turning physicians into iDocs. These consumer tools are moving into the healthcare environment at a break neck speed! We have seen increased usability. That is good. But, we also have seen increased security risks. That is bad”.

Keep reading...
April 28, 2012   |   Gerry Blass

It Is Time to Prepare for an OCR Audit

How to Prepare for a HIPAA – HITECH Audit (Journal of Healthcare Information Management – (JHIM) – Spring 2012 – Used by permission from HIMSS). Covered entities (CEs) and business associates (BAs) can now clearly see the “HIPAA police” up ahead on the “side of the road”.

Keep reading...
October 15, 2011   |   Gerry Blass

Meaningful Use Stage 1 – Information Security Risk Analysis Scope

(Journal of Healthcare Information Management – (JHIM) – Fall 2011 – Used by permission from HIMSS) A question that we have been asked by a number of our clients over the past six (6) months is: “What do we really need to do for Meaningful Use (MU) Stage 1 in regards to information security risk analysis?”

Keep reading...