HIPAA and OSHA compliance products



Comprehensive portal that helps you maintain compliance by helping you stay abreast of changes in compliance laws, rules, and regulations.

Audit Scanning

Quarterly compliance scanning that helps verify that the major technology components of HIPAA and HI-TECH are being followed.


Recent blog articles

NIST Toolkit for HIPAA Security Rule Compliance

If you're a covered entity, you should pay close attention to the requirements of the HIPAA Security Rule. Many doctors, dentists, chiropractors and other covered entities unknowingly violate one or more of the requirements set forth in the Security Rule, placing their respective practice at risk for fines and corrective action. Thankfully, there's a free-to-use tool available to covered entities and business associates to promote greater compliance with the HIPAA Security Rule.
Read More >

OCR Reveals First HIPAA Violation for Failed Breach Notification

Under HIPAA, doctors, chiropractors, dentists and other covered entities are required by law to report breaches of Protected Health Information (PHI) in a timely manner. More specifically, covered entities are required to notify the individuals affected by the breach, the media, and the OCR within 60 days of the breach. And failure to do so could leave the covered entity subject to fines and other corrective actions set forth by the OCR.
Read More >

Cloud Service Providers and HIPAA Compliance

Does your healthcare practice use the services of a cloud service provider (CSP)? Well, you aren't alone. More and more doctors, dentists, chiropractors and other covered entities are using CSPs to store and facilitate their data. After all, it's easier and more convenient to access data stored on the cloud as opposed to data stored locally. But when using a CSP, covered entities must follow some basic steps to ensure full compliance with the HIPAA.
Read More >

HIPAA Security Rule and Computer Operating System Requirements

Back in August 2016, the personal physician for U.S. President-elect Donald Trump came under fire for a photo revealing his office computer. It wasn't the computer that was the problem, rather it was the operating system used on the computer. Dr. Harold Bornstein was using Windows XP on his computer, which is an outdated operating system that Microsoft no longer supports – a possible violation of the HIPAA.
Read More >

HIPAA Requirements for Disposal of PHI

Covered entities must take extra steps to ensure patients' personal information is not accessed by unauthorized individuals. Throwing away a patient's file in a dumpster that's accessible by the public is a violation of the HIPAA Privacy Rule. Even if no one retrieves the file, it's still a violation since the covered entity failed to dispose of the patient's Protected Health Information (PHI) in an appropriate manner. So, what requirements does HIPAA have regarding the disposal of PHI?
Read More >

What is Encryption and Does HIPAA Require it?

HIPAA was updated to include the Security Rule, which specifically focuses on electronic forms of PHI. This was done as a result of doctors and other healthcare practitioners shifting from paper files to electronic media. With more and more doctors storing patients' personal information on computer hard drives, the cloud and other electronic media, there's a greater need for regulations pertaining to electronic media.
Read More >

HIPAA and File Security: What You Should Know

Are you doing enough to protect your patient files from unauthorized access? The Health Insurance Portability and Accountability Act (HIPAA) Security Rule requires covered entities to take certain steps to reduce the risk of disclosure. Unfortunately, many covered entities overlook some of the requirements in the Security Rule, placing them at risk for fines and corrective actions.
Read More >

HIPAA Requirements for Public Health Disclosures

There are laws in place that require doctors, surgeons and other healthcare practitioners to report certain diseases. While some people view this as a violation of privacy, these laws are intended to protect the general public. If a once-rare and dormant disease becomes widespread, for instance, individuals can take the necessary precautions to avoid infection – assuming they know about the disease. So, what types of publish health disclosures are covered entities required to make under HIPAA?
Read More >

Addressable vs Required Specifications in the HIPAA Security Rule

HIPAA was signed into effect in 1996 with the goal of protecting the privacy and individual rights of healthcare patients. Since then, it's been updated several times, with one of the most notable changes being the addition of the Security Rule. The Security Rule differs from the Privacy Rule in the sense that it focuses specifically on ePH). In comparison, the Privacy Rule pertains to all forms of PHI.
Read More >

Subscribe to our mailing list

* indicates required