Download this infographic for the top '5 Things You Should Know About GRC'
Our risk management and healthcare compliance software can help you meet your compliance and security needs.
Manage any federal, state and local compliance regulation.
Manage a high volume of third-party vendor risk management programs
Manage by exception with filtering, alerts and notifications – all in a simple user interface.
Mobilize your audit teams with our mobile application free trial.
Our healthcare compliance consultants are seasoned subject matter experts who provide unbiased reviews.
We perform both internal security audits and vendor risk management services.
All audit results are delivered in our compliance management software portal, not in a spreadsheet.
Our consultants provide a directive action plan as part of your roadmap.
Easily manage a high volume of client audits with a structured tool.
Administer third-party vendor risk management programs.
Manage your clients by exception with extensive filters, automated alerts and notifications.
Provide clients with secure access to their own documents and reports.
"ComplyAssistant’s cloud-based software solution allowed us to efficiently and effectively manage the entire compliance process, from assessment development and distribution through management of action items." --CIO
Gerry Blass – ComplyAssistant President and CEO. Dana Penny – Chief Compliance Officer at The New Jewish Home in New York, NY. In this article, Gerry Blass and Dana Penny walk CISO’s through the process of preparing to pass a spot audit in the June issue of Compliance Today magazine. In the article, Blass and […]Technology Expert Jesse Fasolo Highlights Cybersecurity Threats to Healthcare (Interview)
ComplyAssistant client St. Joseph’s Health’s Jesse Fasolo, PhD student, director, technology infrastructure & cybersecurity, information security officer, said Information security is changing so fast, healthcare systems need to work on shorter strategies so they can pivot to what’s current.Gerry Blass on Healthcare Vendor Risk Management (Podcast)
Healthcare risk doesn’t stop at the facility’s door. Covered entities have countless business associates (BA), each of which poses risks of its own. That, in and of itself, is a challenge, but Gerry Blass, President and CEO of ComplyAssistant observes in this podcast that many covered entities aren’t even sure of their complete list of vendors, let alone the risks that can reside in them.
This is a HIPAA Business Associate Agreement / Contract Addendum template for the requirements of the HITECH Act of 2009 in Microsoft Word format. Use it as a starting point and customize to meet the requirements for your business associates agreements.HIPAA Privacy and Security Proactive Audits Tool Kit
Contains recommended HIPAA Privacy and Security audits that your organization should consider implementing for policies & procedures, proactive information system activity review, and facility walk throughs.HIPAA Facility Security Walkthrough Checklist
Excellent guidance for auditing facilities that contain protected health information. Simply check the boxes and write notes as you conduct your walk-through audit.
In today’s ever-changing cyber landscape, we talk a lot about what measures to take if you have experienced a data breach or ransomware attack. Who do I call if my patient’s health information has been comprised? Do I need to pay the ransom? How long will my organization be down and disrupt the continuity of care?Vendor Risk Management: Solid Strategy to Protect Your Organization and Your Patients Today
In today’s busy world it’s not uncommon for organizations to outsource work to third-party vendors. This can be a great benefit for many reasons: less pressure on the internal team, more time for other pressing tasks, expertise in areas that require more guidance and operational control and efficiency, to name a few.How Privacy and Security Teams Can Collaborate With HIM in the Realm of Cyber Threats
The world of health information management (HIM) continues to evolve. Larger percentages of information have moved to digital and online. At the same time, more health data is being shared across a wider playing field of public, private, and consumer stakeholders, including a larger virtual workforce. This vast amount of electronic healthcare data now resting in multiple hands raises the bar for health systems’ cybersecurity diligence.
An organization’s approach to governance, risk, and compliance can have a huge effect on business. In today’s world of cyber breaches and ransomware attacks on companies of all sizes and scope, organizational leaders must work together to ensure their approach to GRC is intact.The Evolution of Risk to PHI and Patient Safety
In the 70s and 80s, healthcare organizations started to migrate their patient management information from hardcopy to electronic, either on shared mainframes such as SMS and McAuto or on microprocessors. The user workstations had no intelligence and were known as “dumb terminals.” There were limited locations of electronic identifiable health information. There was no motivation to sell identifiable health information.Information Blocking and the Future of Patient Care: Breaking Down the 8 Exceptions
President and CEO Gerry Blass sat down with Journal of AHIMA senior editor Mary Butler on a recent episode of the Hi Pitch Podcast to talk about the 21st Century Cures Act Information Blocking Final Rule and the eight information blocking exceptions. Blass was joined by attorney Helen Oscislawski, who spoke to the challenges her clients have faced as they prepare to comply with the rule, which goes into effect on April 5th.