Compliance Tips

HIPAA IT Compliance Checklist
Struggling with staying on top of HIPAA? Our easy-to-use HIPAA IT compliance checklist will help you keep track of your administrative, technical and physical safeguards.
Moving mountains: Why a healthcare compliance consultant might be your new best friend
Read on for 5 reasons to hire a consultant who can help you remove roadblocks and push your security and compliance strategy forward.

5 Reasons To Take Your Healthcare Compliance Audits Mobile
If you’re still doing HIPAA audits the old-fashioned way with pen and paper, you’re missing out on valuable time savings, and you could be making critical errors in the back-end reporting of healthcare compliance audit information.
Data Breach Litigation: What You Need to Know
As sensitive data breaches become increasingly commonplace, many individuals are seeking to hold breached organizations responsible for the violation of their privacy. As a result, class- action lawsuits have emerged as a popular trend in the world of data breach litigation. With the rapid increase in this type of legal action, healthcare organizations must take measures to prevent data breaches. The first step to prevention is understanding why class-action lawsuits are on the rise as a response to data breaches.
Building Your Medical Device Cybersecurity Protocol
Medical device cybersecurity has become significantly more important in the age of digital health. There are essential actions health systems must take to protect themselves – and their patients. This blog offers 5 guidelines to evaluate and maintain your medical device cybersecurity.

PHI Breaches – Have You Conducted Your PHI Vulnerability Assessment?
A concern in security risk assessment is ongoing PHI breaches. A proper HIPAA risk assessment tool such as PHI Vulnerability Assessment can help.
Meaningful Use Stage 1 – Information Security Risk Analysis Scope
(Journal of Healthcare Information Management – (JHIM) – Fall 2011 – Used by permission from HIMSS) A question that we have been asked by a number of our clients over the past six (6) months is: “What do we really need to do for Meaningful Use (MU) Stage 1 in regards to information security risk analysis?”