Why are Security & Governance for Health Data Analytics Vital?

[vc_row][vc_column][vc_video link="https://youtu.be/fDBd5Z3NulA"][vc_column_text] This…

How to Conduct an OCR-Quality Risk Analysis

[vc_row][vc_column][vc_video link="https://youtu.be/SoLewrHD-aI"][vc_column_text]Bob…

HIPAA and the HITECH Act: Recent Case Law, Statutory Changes, and Penalty Assessments

Rachel V. Rose, JD, MBA is a Principal with Rachel V. Rose –…

Best Practices for Implementing PHI Security

[vc_row][vc_column][vc_video link="https://youtu.be/d_kMo9eLvyQ"][vc_column_text]William…

Deadline for Breach Reporting Coming Soon

As the end of the year approaches, keep in mind that all breaches…

OIG WORKPLAN 2016

The Office of the Inspector General (OIG) is responsible for…
Performance Improvement Plan

Are You Prepared for the HIPAA Phase 2 Audits?

After reviewing the HIPAA Privacy case investigations from 2009-2011,…

Are your mobile devices HIPAA compliant?

As the world of healthcare evolves, more and more healthcare…

What is the Wall of Shame?

As part of HITECH, any breach of over 500 individuals will be…