Image of tax forms for blog about Understanding Title V of HIPAA

2 min read

Understanding Title V of HIPAA

Title V of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) focuses on revenue offsets to address specific tax-related provisions for employers and individuals. While it is less commonly discussed compared to the privacy and...

Read More
empty hospital bed

2 min read

Can covered entities share information with family members after a death?

“The Privacy Rule permits a covered entity to disclose protected health information about a decedent to a family member, or other person who was...

Read More
Image of lock on keyboard for blog about Common causes of data breaches

2 min read

Common causes of data breaches

Data breaches can occur for various reasons, often stemming from vulnerabilities in systems, processes, or human error. We’ll go over some of the...

Read More
Image of stethoscope and heart for blog about Title I of the Health Insurance Portability and Accountability Act (HIPAA)

2 min read

Title I of HIPAA

Title I of the Health Insurance Portability and Accountability Act (HIPAA) is focused on Health Care Access, Portability, and Renewability. It...

Read More
Image of blocks representing insurance for blog about What is Title IV under HIPAA?

2 min read

What is Title IV under HIPAA?

Title IV of HIPAA is the Enforcement and Revenue Offsets section, which focuses on ensuring compliance with the act’s provisions regarding health...

Read More
Image of someone typing for blog about What is endpoint protection?

2 min read

What is endpoint protection?

Endpoint protection, also known as endpoint security, is the securing endpoints or entry points of end-user devices such as desktops, laptops,...

Read More
Image of shield for blog about What is Title II of HIPAA?

2 min read

What is Title II of HIPAA?

Title II of HIPAA is the Administrative Simplification provision, designed to improve the efficiency of healthcare systems by standardizing the...

Read More
Image of shield for blog about Federal government unveils updated cyber incident response plan

3 min read

Federal government unveils updated cyber incident response plan

The federal government has proposed updates to the National Cyber Incident Response Plan (NCIRP) to strengthen public-private partnerships and...

Read More
Image of someone on a computer for blog about Hacker leaks Cisco DevHub data

2 min read

Hacker leaks Cisco DevHub data

A hacker known as IntelBroker has leaked 2.9 GB of files from Cisco's publicly accessible DevHub platform. However, Cisco insists that its systems...

Read More
Image of stethoscope for blog about Consequences of the Medicare Advantage (MA) plan fraud

2 min read

Consequences of the Medicare Advantage (MA) plan fraud

The U.S. Department of Health and Human Services (HHS) Office of Inspector General (OIG) issued a Special Fraud Alert addressing serious concerns...

Read More
Image of gift cards for blog about OIG warns against suspect payment schemes in the Medicare Advantage program

3 min read

OIG warns against payment schemes in the Medicare Advantage program

The Office of Inspector General (OIG) has issued a Special Fraud Alert warning of potential fraud and abuse risks in marketing arrangements for...

Read More
Image of gavel and book for blog about What are the “Titles” in HIPAA?

2 min read

What are the “Titles” in HIPAA?

The Health Insurance Portability and Accountability Act (HIPAA) is a U.S. federal law designed to protect sensitive patient information and improve...

Read More
Image of two people shaking hands for blog about Are cybersecurity firms business associates?

2 min read

Are cybersecurity firms business associates?

Cybersecurity firms are not automatically considered business associates under the Health Insurance Portability and Accountability Act (HIPAA)....

Read More