Recent Articles

  • The Benefits of Compliance Audit Software

    Published On: October 7th, 2024

    Audits, whether internal or the results of an external audit, can be costly. However, not auditing or not being prepared for an unplanned audit can be even [...]

  • What Every Compliance Officer Should Know About Healthcare Audits

    Published On: October 4th, 2024

    Despite your best efforts in meeting healthcare compliance requirements, errors may still occur. Maintaining the security and integrity of sensitive information and preventing waste, fraud, and abuse [...]

  • September 2024 Healthcare Breach Report – 4.37 Million Affected

    Published On: October 3rd, 2024

    In September 2024, the OCR Breach Portal listed 26 incidents affecting 4,377,193 patients. The most affected group was health plans, reporting four incidents affecting 3,118,229 patients. This [...]

  • What to Include in Your OSHA Policies and Procedures Manual

    Published On: October 2nd, 2024

    Regarding safety in the healthcare setting, it’s not just the patients that need our attention. Your employees also require safe working conditions that eliminate chemical exposure and [...]

  • The Essentials of FWA Training in Healthcare

    Published On: October 1st, 2024

    Compliance officers and other organizational leaders must be constantly vigilant of resource waste and the inappropriate and illegal use of funds from Medicare and other federal programs. [...]

  • Health Information Technology Provider Particle Health Files EPIC Lawsuit

    Published On: September 30th, 2024

    In late September, Particle Health, a patient data aggregation and delivery platform that provides both data and insights to healthcare companies, filed a lawsuit against Epic Systems, [...]

Blog Categories

  • 42 CFR Part 2

    42 CFR Part 2 dictates rules for the confidentiality of substance abuse records. Find out when providers are permitted to share records and when they are not.

  • Healthcare Compliance

    Healthcare compliance is complex, especially when you have to meet multiple compliance standards. Learn how to navigate HIPAA, OSHA, and SOC 2 requirements.

  • Healthcare Data Breach Report

    Each month, we review what caused healthcare data breaches and how they could have been prevented. Learn how to protect your business from breaches and fines.

  • HIPAA Compliance

    Whether you’re a healthcare provider, health plan, or healthcare vendor, you must meet HIPAA standards. Learn what’s required for HIPAA compliance and how to implement a successful program.

  • HIPAA News

    Keep up to date on HIPAA news by checking in with us. We will provide you with information on changes to HIPAA law, healthcare breaches, HIPAA violations, and OCR fines.

  • HIPAA Violation Fines

    Healthcare organizations that fail to meet HIPAA Privacy, Security, or Breach Notification Rules can face HIPAA violation fines. Find out who has been fined and how they could have prevented penalties.

  • MACRA MIPS

    To be eligible for reimbursement under the Merit-based Incentive Payment System (MIPS), you must meet Medicare Access and CHIP Reauthorization Act (MACRA) standards.

  • OCR Enforcement

    The Office for Civil Rights (OCR) is the enforcing body of HIPAA. The OCR conducts investigations into potential HIPAA violations, issuing judgments that can result in settlements.

  • OIG Compliance

    The Office of Inspector General (OIG) released guidance, referred to as the seven elements of compliance. Find out how to implement an effective compliance program.

  • OSHA Healthcare Compliance

    OSHA healthcare compliance ensures a safe and healthy environment for patients and staff. Find out how to meet various OSHA standards specific to healthcare.

  • Right of Access

    The HIPAA Right of Access standard requires healthcare providers to comply with patient record requests. This standard is the most cited in HIPAA settlements. Learn the rules.

  • SOC 2 Compliance

    The American Institute of Certified Public Accountants (AICPA) created a cybersecurity framework called Service Organization Control Type 2 (SOC 2). Learn how about SOC 2 compliance.