2 min read
What are the HIPAA requirements after a breach?
Between April 2003 and October 2024, the U.S. Department of Health and Human Services (HHS)has recorded a staggering 374,322 cases of HIPAA breaches...
2 min read
Between April 2003 and October 2024, the U.S. Department of Health and Human Services (HHS)has recorded a staggering 374,322 cases of HIPAA breaches...
3 min read
Under HIPAA, patient authorization exceptions allow protected health information (PHI) disclosure without consent for treatment, payment, and...
5 min read
As the healthcare sector becomes more globalized, local hospitals must understand the HIPAA implications of outsourcing to non-US-based...
1 min read
When evidence used in workplace violence (WPV) reports contains identifiable details about a patient that could link them to the organization and the...
2 min read
Monitoring HIPAA compliance is a continuous process that requires a proactive and systematic approach. From implementing policies to conducting...
2 min read
Engaging stakeholders in a HIPAA compliant manner involves safeguarding protected health information (PHI) while encouraging collaboration among...
2 min read
An incident response plan (IRP) supports HIPAA compliance by providing a structured framework to manage security incidents effectively.
2 min read
No, you are not required to retain a decedent’s health records for 50 years under HIPAA. The HIPAA Privacy Rule protects a decedent’s protected...
2 min read
A HIPAA compliance gap is a discrepancy or shortcoming between an organization's current practices and the requirements set forth by the Health...
3 min read
HIPAA compliance involves adhering to the standards set forth by the Health Insurance Portability and Accountability Act (HIPAA) to ensure the...
3 min read
Internal and external HIPAA audits are not interchangeable; they are complementary tools in a comprehensive compliance strategy. Internal audits are...
2 min read
According to the HHS Security Series on Risk Analysis and Management, “The required implementation specification at § 164.308(a)(1)(ii)(A), for Risk...
3 min read
Risk analysis includes identifying where ePHI is created, received, maintained, or transmitted. Organizations can discover potential risks to their...