The HIPAA compliant resources on this page will give you the advantage you need to start to assess the status of your compliance. Our free tools and educational resources come from the top HIPAA experts in the country who are working with us to help you succeed. Please feel free to download and utilize our HIPAA compliant resources – and to contact us directly if you have any questions about becoming HIPAA compliant.
Stay Updated on the Latest HIPAA News
AMCA Data Breach Continues to Expose New Victims
In August of 2019, Mount Sinai Hospital, a part of the Mount Sinai Health System, began notifying approximately 33,000 patients that it has been impacted by the - American Medical Collection Agency - AMCA [...]
Healthcare Vendor Management: 4 Steps to Prevent Vendor Data Breaches
To satisfy the Health Insurance Portability and Accountability Act (HIPAA) healthcare vendor management must be implemented. Healthcare data breaches are on the rise, and many of the incidents of late were the result of [...]
Limited HIPAA Waiver Issued for Hurricane Dorian
As Hurricane Dorian moves up the East Coast, the Secretary of the Department of Health and Human Services (HHS), Alex Azar, has declared a public health emergency in Puerto Rico, and in the states [...]
122,000 Patients Affected by PHI Breach
Providence Health Plan, a dental program in Oregon, may have experienced a PHI breach that risked the protected health information (PHI) of 122,000 patients. The breach was a result of a security breach of [...]
UCMC and Google File Motion to Dismiss HIPAA Privacy Lawsuit
In late June of 2019, a class action lawsuit was filed against the University of Chicago Medical Center (UCMC) and Google. In this HIPAA Privacy lawsuit, the lawsuit alleges that UCMC [...]
HIPAA Security Risk Analysis Element 3: Assessing Current Security Measures
The HIPAA Security Rule requires that covered entities (health plans, healthcare clearinghouses, and healthcare providers who electronically transmit any health information in connection with a HIPAA related transaction), and business associates, implement security safeguards. [...]