Recent Articles

  • HIPAA Compliant Document Sharing: How to Send Medical Records Electronically

    Published On: March 31st, 2023

    Electronic medical records (EMR) have become the norm as the healthcare industry continues to digitize. EMRs facilitate the secure sharing of patient health information (PHI) between healthcare [...]

  • The Rise of Cybercrime: What the 2022 IC3 Report Reveals About Healthcare

    Published On: March 30th, 2023

    The internet has revolutionized how we communicate, connect, and conduct business. It has provided us with endless opportunities and has made our lives easier in many ways. [...]

  • OSHA Fire Prevention Plans for Healthcare Organizations

    Published On: March 29th, 2023

    Compliance with Occupational Safety and Health (OSHA) regulations as a healthcare organization requires much more than just saying, "be careful." Making it more challenging is the fact [...]

  • Following the Trail of SOC 2 HIPAA Mapping

    Published On: March 28th, 2023

    According to the Department of Health and Human Services (HHS), Office for Civil Rights (OCR), in 2020, the requirements of HIPAA applied to at least 2.7 million [...]

  • Data Breach of Four Californian Medical Groups Leaves 3.3MM Patients Vulnerable

    Published On: March 27th, 2023

    A class action lawsuit has been named against four Californian medical groups, alleging that they failed to take reasonable and appropriate cybersecurity precautions, leading to a cyberattack [...]

  • Does Your OSHA Emergency Action Plan Measure Up?

    Published On: March 24th, 2023

    Look at lists of fines and violations issued by OSHA (the Occupational Safety and Health Administration). You will quickly see that the agency takes protecting employees very [...]

Blog Categories

  • 42 CFR Part 2

    42 CFR Part 2 dictates rules for the confidentiality of substance abuse records. Find out when providers are permitted to share records and when they are not.

  • Healthcare Compliance

    Healthcare compliance is complex, especially when you have to meet multiple compliance standards. Learn how to navigate HIPAA, OSHA, and SOC 2 requirements.

  • Healthcare Data Breach Report

    Each month, we review what caused healthcare data breaches and how they could have been prevented. Learn how to protect your business from breaches and fines.

  • HIPAA Compliance

    Whether you’re a healthcare provider, health plan, or healthcare vendor, you must meet HIPAA standards. Learn what’s required for HIPAA compliance and how to implement a successful program.

  • HIPAA News

    Keep up to date on HIPAA news by checking in with us. We will provide you with information on changes to HIPAA law, healthcare breaches, HIPAA violations, and OCR fines.

  • HIPAA Violation Fines

    Healthcare organizations that fail to meet HIPAA Privacy, Security, or Breach Notification Rules can face HIPAA violation fines. Find out who has been fined and how they could have prevented penalties.

  • MACRA MIPS

    To be eligible for reimbursement under the Merit-based Incentive Payment System (MIPS), you must meet Medicare Access and CHIP Reauthorization Act (MACRA) standards.

  • OCR Enforcement

    The Office for Civil Rights (OCR) is the enforcing body of HIPAA. The OCR conducts investigations into potential HIPAA violations, issuing judgments that can result in settlements.

  • OIG Compliance

    The Office of Inspector General (OIG) released guidance, referred to as the seven elements of compliance. Find out how to implement an effective compliance program.

  • OSHA Healthcare Compliance

    OSHA healthcare compliance ensures a safe and healthy environment for patients and staff. Find out how to meet various OSHA standards specific to healthcare.

  • Right of Access

    The HIPAA Right of Access standard requires healthcare providers to comply with patient record requests. This standard is the most cited in HIPAA settlements. Learn the rules.

  • SOC 2 Compliance

    The American Institute of Certified Public Accountants (AICPA) created a cybersecurity framework called Service Organization Control Type 2 (SOC 2). Learn how about SOC 2 compliance.