Download this infographic for the top '5 Things You Should Know About GRC'
Our risk management and healthcare compliance software can help you meet your compliance and security needs.
Manage any federal, state and local compliance regulation.
Manage a high volume of third-party vendor risk management programs
Manage by exception with filtering, alerts and notifications – all in a simple user interface.
Mobilize your audit teams with our mobile application free trial.
Assess threats and controls across your entire organization with the risk register.
Our healthcare cybersecurity consultants are seasoned subject matter experts who provide unbiased reviews.
We perform both internal security audits and vendor risk management services.
All audit results are delivered in our compliance management software portal, not in a spreadsheet.
Our consultants provide a directive action plan as part of your roadmap.
Easily manage a high volume of client audits with a structured tool.
Administer third-party vendor risk management programs.
Manage your clients by exception with extensive filters, automated alerts and notifications.
Provide clients with secure access to their own documents and reports.
"ComplyAssistant’s cloud-based software solution allowed us to efficiently and effectively manage the entire compliance process, from assessment development and distribution through management of action items." --CIO
Just as we tell our clients that privacy and security is everyone’s responsibility, we also believe it’s our responsibility to help educate the industry about best practices for protecting critical data and infrastructure. To that end, ComplyAssistant has partnered with industry-leading companies to produce the PriSec Boot Camp. To help prepare professionals at all levels—from […]ComplyAssistant to speak on preparing an organization’s downtime plan past 72 hours at the NJ HIMSS and NJ HFMA Fall Conferences
Gerry Blass (President & CEO, ComplyAssistant), Rick Lang (Vice President and CIO, Doylestown Health System), Jim Cavanagh (Principal Consultant, Executive Healthcare Consulting), and John Hueter (Chief Executive Officer, Digital Health Consulting, LLC) are scheduled to speak at the New Jersey Delaware Valley 2022 Fall Conference on October 13, 2022 and the New Jersey & Metro Philadelphia HFMA Annual […]ComplyAssistant to speak on strategies and tactics for health care organizations to consider for reducing cybersecurity risks at the NJ HFMA Annual Institute
Gerry Blass, President & CEO, ComplyAssistant, and Francois Bodhuin, Technology Director and CISO, Inspira Health are scheduled to speak at the New Jersey & Metro Philadelphia HFMA Annual Institute on October 26, 2022. A summary of their presentation can be found below. If you would like to register for the event, click here for more information. Gerry […]
This free tool is a HIPAA Business Associate Agreement / Contract Addendum template for the requirements of the HITECH Act of 2009 and Omnibus Final Rule 2013 in Microsoft Word format. Use it as a starting point and customize it to meet the requirements for your business associate agreements. For continued due diligence of third parties, consider vendor risk management software or vendor risk management services to evaluate their security position.HIPAA Privacy and Security Proactive Audits Tool Kit
Contains recommended HIPAA Privacy and Security audits that your organization should consider implementing for policies & procedures, proactive information system activity review, and facility walkthroughs.HIPAA Facility Security Walkthrough Checklist
Excellent guidance for auditing facilities that contain protected health information. Simply check the boxes and write notes as you conduct your walk-through audit.
Health care investments in privacy and security are set to explode in the wake of ongoing cyberattacks and rising risk. Know the three most important risk areas to fortify and be prepared for the 2023 surge.Are You Vulnerable? Dig into HIPAA Risk Assessment and Risk Management
Cybersecurity threats in healthcare have posed serious risks and challenges for years. As a result, the government recognized the need to regulate access to electronic protected health information, or ePHI. The Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health (HITECH) Act were designed and implemented as national standards for the privacy of protected health information, the security of ePHI, and breach notification to consumers. These rules include risk assessment and risk management by covered entities.HIPAA Audits: The Importance of Preparing and the Significance of Compliance
The use of health information technology becomes more prevalent in healthcare every day. As with most things, this presents pros and cons. New technologies offer opportunities and benefits for consumers, but they also present risks to consumer privacy
An organization’s approach to governance, risk, and compliance can have a huge effect on business. In today’s world of cyber breaches and ransomware attacks on companies of all sizes and scope, organizational leaders must work together to ensure their approach to GRC is intact.The Evolution of Risk to PHI and Patient Safety
In the 70s and 80s, healthcare organizations started to migrate their patient management information from hard copy to electronic, either on shared mainframes such as SMS and McAuto or on microprocessors. The user workstations had no intelligence and were known as “dumb terminals.” There were limited locations of electronic identifiable health information. There was no motivation to sell identifiable health information.Information Blocking and the Future of Patient Care: Breaking Down the 8 Exceptions
President and CEO Gerry Blass sat down with Journal of AHIMA senior editor Mary Butler on a recent episode of the Hi Pitch Podcast to talk about the 21st Century Cures Act Information Blocking Final Rule and the eight information blocking exceptions. Blass was joined by attorney Helen Oscislawski, who spoke to the challenges her clients have faced as they prepare to comply with the rule, which goes into effect on April 5th.