The HIPAA compliant resources on this page will give you the advantage you need to start to assess the status of your compliance. Our free tools and educational resources come from the top HIPAA experts in the country who are working with us to help you succeed. Please feel free to download and utilize our HIPAA compliant resources – and to contact us directly if you have any questions about becoming HIPAA compliant.
Stay Updated on the Latest HIPAA News
July Healthcare Breaches Worst Month on Record
The Department of Health and Human Services (HHS) began tracking data breaches in 2009. The HHS publishes meaningful breaches on their "wall of shame.” A meaningful breach affects 500 or more individuals. July healthcare [...]
3 Easy Steps to Get your Microsoft Business Associate Agreement
The Health Insurance Portability and Accountability Act (HIPAA) set forth industry standards for the handling of protected health information (PHI). PHI is any individually identifying health information such as name, date of birth, treatment information, [...]
PHI Breaches Affect 9,466 Patients
PHI breaches happen for a number of reasons, whether from human error or phishing attacks, PHI breaches should be a cause for concern for anyone working in the healthcare industry. Under [...]
Almost 3,000 Patients Exposed in PHI Breach
A server used by Rhode Island Ear, Nose, and Throat Physicians Inc. (RIENT) was accessed by an unauthorized party, allowing hackers to access RIENT’s network. The protected health information (PHI) of 2,943 patients was [...]
New Hampshire Insurance Data Security Law
Recently, the Governor of New Hampshire approved Senate Bill 194 (SB 194), an insurance data security law that requires insurers who handle nonpublic information (including health information) to implement a series [...]
Another Day, Another Healthcare Breach
Massachusetts General Hospital (MGH) experienced a healthcare breach that left 9,900 patients’ protected health information (PHI) exposed. Hackers gained access to MGH’s research databases through a third-party vendor. The exposed information included data collected [...]