THE TOTAL HIPAA
Resource Library
Featured Articles
Artificial Intelligence in HIPAA Compliance
What is AI? Artificial intelligence is the science of making machines that can learn, similar to the ways humans do. AI technology can process large amounts of data in ways that humans can’t....
How to Handle Subcontractors Under HIPAA
There are many scenarios in business and healthcare in which PHI is moved and shared. In the 1990s a lot of this happened over fax machines, over the phone and in person. In the modern landscape...
Interpreting The Confidentiality of Substance Use Disorder (SUD) Patient Records Law (42 CFR Part 2)
In the world of healthcare, patient privacy and data confidentiality are of utmost importance. To ensure the protection of sensitive information related to Substance Use Disorder (SUD) patients, the...

A History of HIPAA: 8 Things You Should Know
The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996 to protect American families ...

A Data Breach Affects Your Wallet – and Your Reputation
When you prepare for HIPAA compliance, you may not immediately think about the possibility of a data breach and ...

The Ins and Outs of Risk Management
Risk Assessment and Risk Management
A Risk Assessment1 is a first step in protecting your organization, but it ...

My Business Just Experienced a Cyber-Attack!
What's New?
Health and Human Services, Office for Civil Rights (HHS OCR) released a cybersecurity checklist and ...

5 Common HIPAA Mistakes
Now more than ever, HIPAA compliance is a must.
It’s hard to believe, but HIPAA errors found to be violations can ...

HIPAA Compliance Will Stop Ransomware’s Damage
On average, there have been 4,000 daily ransomware attacks since early 2016, an increase of 300% from the 1,000 ...

WannaCry Ransomware Protection with HIPAA
WannaCry, WannaCrypt, Wana Decryptor or WCry, whatever it is called, ransomware has been spreading through over ...

Creating and Managing Passwords
How many times a day do you access applications or websites that require passwords? The temptation is to make ...

Malicious Social Engineering and HIPAA
Spam accounts for 65% of the total volume of global internet email traffic according to Cisco’s 2017 Annual ...

HIPAA Violations Every Day and Every Size
We frequently get questions about whether or not an event is a HIPAA violation. Some of the events are hazy, ...

Navigating HIPAA and State-Specific Medical Records Retention Requirements
The Health Insurance Portability and Accountability Act (HIPAA) mandates that Covered Entities and Business ...

Auditing Business Associates
Have you Audited your HIPAA Business Associates?
This question comes up frequently when we are working on HIPAA ...

Implementing HIPAA is More Than Meeting Government Regulations
Recently, I was on a vacation in Germany, and as I visited several medieval cities, I had two thoughts. First, ...

The FTC Act and HIPAA Protect the Same Information
You collect Personally Identifiable Information (PII) about your patients, employees and clients, which can be ...

Microsoft End of Support for 2017
Note: We update this list every year. To see the most recent version of this post, click here.
There are numerous ...

It’s Time to Report Small Breaches
Deadline for Reporting HIPAA Breaches Affecting Fewer than 500 Individuals – February 28, 2017
HIPAA breaches ...

Are You Prepared for Ransomware?
Both large and small businesses are warned about hackers getting into their files and demanding a ransom in order ...

HIPAA and Cloud Computing Part II
Health and Human Services (HHS), Office of Civil Rights’ (OCR) Phase 2 of the HIPAA Audit Program is scheduled to ...

Encrypting Devices
Most electronic devices come with the ability to encrypt the internal drive. Encrypting your data adds an extra ...

HIPAA Compliant Email Encryption Review
Covered Entities, Business Associates and Business Associate Subcontractors are required to protect the PHI they ...
Take control of your compliance.
