The HIPAA compliant resources on this page will give you the advantage you need to start to assess the status of your compliance. Our free tools and educational resources come from the top HIPAA experts in the country who are working with us to help you succeed. Please feel free to download and utilize our HIPAA compliant resources – and to contact us directly if you have any questions about becoming HIPAA compliant.

HIPAA Recipe Book

HIPAA Screensaver

HIPAA Compliant Sign In Sheets

HIPAA Cybersecurity eBook

HIPAA Compliant Fax Cover Sheet

How to Make Gmail HIPAA Compliant

Making Windows 10 Compliant

HIPAA Guide for MSPs

HIPAA Quiz

HIPAA BYOD Policy

Telecommuting Policy

Stay Updated on the Latest HIPAA News

3008, 2019

July Healthcare Breaches Worst Month on Record

The Department of Health and Human Services (HHS) began tracking data breaches in 2009. The HHS publishes meaningful breaches on their "wall of shame.” A meaningful breach affects 500 or more individuals. July healthcare [...]

2808, 2019

PHI Breaches Affect 9,466 Patients

PHI breaches happen for a number of reasons, whether from human error or phishing attacks, PHI breaches should be a cause for concern for anyone working in the healthcare industry. Under [...]

2708, 2019

Almost 3,000 Patients Exposed in PHI Breach

A server used by Rhode Island Ear, Nose, and Throat Physicians Inc. (RIENT) was accessed by an unauthorized party, allowing hackers to access RIENT’s network. The protected health information (PHI) of 2,943 patients was [...]

2708, 2019

New Hampshire Insurance Data Security Law

Recently, the Governor of New Hampshire approved Senate Bill 194 (SB 194), an insurance data security law that requires insurers who handle nonpublic information (including health information) to implement a series [...]

2608, 2019

Another Day, Another Healthcare Breach

Massachusetts General Hospital (MGH) experienced a healthcare breach that left 9,900 patients’ protected health information (PHI) exposed. Hackers gained access to MGH’s research databases through a third-party vendor. The exposed information included data collected [...]