
The HIPAA compliant resources on this page will give you the advantage you need to start to assess the status of your compliance. Our free tools and educational resources come from the top HIPAA experts in the country who are working with us to help you succeed. Please feel free to download and utilize our HIPAA compliant resources – and to contact us directly if you have any questions about becoming HIPAA compliant.
Stay Updated on the Latest HIPAA News
HIPAA Cyber Security – Advanced Persistent Threats (APTs)
Covered entities (health plans, healthcare clearinghouses, and healthcare providers who electronically transmit any health information in connection with a HIPAA related transaction), and business associates must comply with the HIPAA Security [...]
What Are HIPAA Data Retention Requirements?
The HIPAA data retention requirements apply to both covered entities and business associates. HIPAA data retention requirements mandate that covered entities and business associates maintain certain documentation for a specified time frame. If [...]
Is Google Drive HIPAA Compliant?
With the ever-growing importance of data privacy and security, it's no wonder that many healthcare organizations are asking the question: "Is Google Drive HIPAA compliant?" As one of the world's most popular [...]
Hundreds of Patient Files Found in NY Trash Causing HIPAA Violation
NBC New York I-Team found multiple boxes containing patient records in the trash outside of an Upper East side office building. The patient files were found on the curb outside the [...]
HIPAA Security Risk Analysis: Wrapping it All Up
The HIPAA Security Rule requires that covered entities (health plans, healthcare clearinghouses, and healthcare providers who electronically transmit any health information in connection with a HIPAA related transaction), and business associates, implement security safeguards. [...]
Phishing Attacks at Magellan Health Subsidiaries
Magellan Health is a managed care provider based in Arizona. Recently, Magellan Health discovered that two of its subsidiaries suffered phishing attacks. The phishing attacks have exposed the protected health information [...]
















