2 min read
Incidental PHI exposure and business associate agreements
A business associate agreement (BAA) is not required for organizations or individuals, such as janitorial services, whose functions don’t involve...
2 min read
A business associate agreement (BAA) is not required for organizations or individuals, such as janitorial services, whose functions don’t involve...
3 min read
Fitness and health clubs are not considered covered entities under HIPAA. However, there are potential exceptions, like a wellness program under a...
3 min read
Professional medical interpreters assist in facilitating communication between healthcare providers and patients with limited proficiency in the...
3 min read
HIPAA exceptions include general rulings, emergency scenarios, state and federal exclusions, operational and occupational variations, and exceptions...
5 min read
To comply with HIPAA, it’s best to follow a roadmap of the most important aspects of compliance. Below is a checklist of what you can do for your...
2 min read
HIPAA mainly protects a patient's protected health information (PHI), which drug testing can often fall under. Drug test results are treated like any...
2 min read
No, signing a business associate agreement (BAA) does not automatically make a vendor HIPAA compliant. While a BAA is required, it only outlines the...
2 min read
Group therapy practitioners should manage text threads to protect patient privacy and be compliant with HIPAA.
2 min read
Delivery truck lines help transport goods or documents. They are not considered business associates under HIPAA, as they typically do not handle or...
2 min read
In its role as a carrier of physical packages containing PHI, UPS is not considered a business associate under HIPAA because it qualifies for the...
3 min read
A covered entity is not liable for the actions of its business associates nor required to monitor their actions under HIPAA. While covered entities...
3 min read
Healthcare organizations can avoid a HIPAA breach when emailing patient payment information by using encrypted email services, securing business...