"I was so impressed with your command of such a complex and complicated subject."

HIPAA Blog2021-07-12T20:56:29+00:00

HIPAA Associates presents a source of knowledge on the HIPAA Privacy-Security Rule which will help you manage your program. Our HIPAA Blog covers the basics of HIPAA which you need to know. We will also keep you informed of new rules as they are made available. Our HIPAA ABC newsletter provides key concepts on HIPAA which are easy to read and to understand.

Security Risk Analysis

What is the difference between a HIPAA Gap Analysis and a HIPAA Risk Analysis? Many organizations use these interchangeably, however, they are not correct in doing so. Don't make the same mistake. We can help you understand the difference.

By |September 15, 2019|Categories: Security Technical Safeguards|Tags: , |Comments Off on Security Risk Analysis

Texting Protected Health Information Safely

The Office for Civil Rights or OCR with HIPAA oversight has not produced the long-awaited guidance on texting protected health information. Finally, at a Health Information Management Conference in March the OCR director said healthcare providers could text message their patients with PHI.

By |August 22, 2018|Categories: Disclosures of Protected Health Information, Security Technical Safeguards|Comments Off on Texting Protected Health Information Safely

The Right to Access Protected Health Information

One of the key elements of HIPAA has been to provide individuals with a right to access PHI such that they may be in more control of decisions regarding their health and well-being. The Health Insurance Portability and Accountability Act of 1996 (HIPAA), was created to protect the privacy and security of individuals’ identifiable health information and in addition to establish individual rights with respect to health information. It has always [...]

By |June 7, 2018|Categories: Privacy Rule|Comments Off on The Right to Access Protected Health Information

Using Cybersecurity to Protect PHI

HIPAA Technical Safeguards protect PHI and are a major part of any HIPAA Security program. Using cybersecurity to protect EPHI is a key feature of HIPAA. Technical safeguards are key protections that help to maintain the safety of EPHI as the internet changes.

By |September 9, 2018|Categories: Security Technical Safeguards|Tags: |Comments Off on Using Cybersecurity to Protect PHI
Go to Top