Image of someone signing an agreement for blog about Terminating a BAA

2 min read

Terminating a BAA

Terminating a business associate agreement (BAA) means ending the legal contract between a covered entity and a business associate. This action formally ends the obligations and responsibilities of both parties regarding the handling, use, and...

Read More
Image of gavel for blog about Legal liabilities associated with a data breach 

2 min read

Legal liabilities associated with a data breach

The legal liabilities stemming from data breaches are extensive and multifaceted. Beyond fines and lawsuits, organizations risk long-term damage to...

Read More
digital globe over skyline

2 min read

Addressing discrimination in AI

Discrimination in AI is the unfair or unequal treatment of individuals or groups by AI systems, often stemming from biases in data or algorithmic...

Read More
Image of heart and stethascope for blog about HHS Administration reflects on 2024 achievements and challenges

3 min read

HHS Administration reflects on 2024 achievements and challenges

The HHS Office for Civil Rights reflects on a year of advancing healthcare equity and civil rights through rule updates, enforcement actions, and...

Read More
Image of books for blog about Are educational email campaigns part of marketing?

2 min read

Are educational email campaigns part of marketing?

Yes, educational email campaigns are an integral part of marketing. These campaigns focus on providing valuable information to the audience, building...

Read More
Image of data to represent AI for blog about HHS issues guidelines to ensure fair and secure use of AI in healthcare

3 min read

HHS issues guidance to ensure fair and secure use of AI in healthcare

The HHS Office for Civil Rights has issued guidance to healthcare entities on responsibly using AI tools, emphasizing compliance with...

Read More
Image of lock for blog about What is an insider threat?

2 min read

What is an insider threat?

An insider threat is a security risk that comes from within an organization. It involves individuals who have access to an organization's systems,...

Read More
Image of binder for blog about A guide to developing policies for handling PHI

3 min read

A guide to developing policies for handling PHI

Protected health information (PHI) is among the most sensitive data in healthcare, and safeguarding establishes patient privacy, maintains trust, and...

Read More
hacker on laptop

2 min read

MA & VA firms reach $170K settlement with HHS for ransomware breaches

Elgon Inc. and Virtual Private Network Solutions have agreed to pay $170,000 in fines and implement corrective action plans after investigations...

Read More
Image of file folders for blog about Can you be charged for requesting a copy of your PHI?

1 min read

Can you be charged for requesting a copy of your PHI?

Patients can be charged a fee for requesting a copy of their protected health information (PHI), but the fee must comply with the guidelines set...

Read More
Image of puzzle for blog about HIPAA compliant communication during mergers

2 min read

HIPAA compliant communication during mergers

Healthcare mergers and acquisitions often involve transferring sensitive patient information between entities. Ensuring HIPAA compliance during this...

Read More
Image of someone on a computer for blog about U.S. Army soldier arrested for alleged role in hacking incident

3 min read

U.S. Army soldier arrested for alleged role in hacking incident

A U.S. Army communications specialist was arrested in Texas for allegedly leaking presidential call logs and hacking telecommunications firms as part...

Read More
Image of binder for blog about SOPs for sending HIPAA compliant email

2 min read

SOPs for sending HIPAA compliant email

Standard operating procedures (SOPs) for HIPAA compliant email ensure organizations meet the privacy and security requirements mandated by the Health...

Read More