Health IT Security and Compliance

Understanding the OCR 90-Day Transition Period

By Art Gross – The Office for Civil Rights 90-day transition period commenced on May 12, 2023. As a HIPAA compliance company, we understand the importance of staying up-to-date with regulatory changes. Let’s delve into the transition period and its significance, and provide guidance on how your organization can ensure seamless compliance in this evolving landscape.

Read More

End of COVID-19 Public Health Emergency

By Art Gross – On May 11, 2023, the PHE declaration expired. With this, the relaxed regulations and waivers put in place during the pandemic expired, and providers need to return to full compliance with HIPAA regulations. Be sure your policies and procedures for safeguarding PHI are up to date.

Privacy vs. Security Rule

By Art Gross – When it comes to HIPAA compliance, it’s easy to feel as if you’re being pulled in a million different directions at once. In part, this could be due to the fact that there are 4 different rules that go into HIPAA: the Privacy Rule, the Security Rule, the Breach Notification Rule, and the Omnibus Rule.

Physical Safeguards for HIPAA Compliance

By Art Gross – While it’s easy to get caught up in the many, many words of policies and procedures, how your space physically looks and functions are just as important. Physical safeguards play a vital role in achieving HIPAA compliance and keeping sensitive data out of the wrong hands.

HIPAA: Deficient or Miscast

By Matt Fisher – The development of new technology in healthcare and the massive expansion in sources of healthcare data have both created many complications when it comes to protecting and securing sensitive information about individuals.

Be Alert: Phishing Attacks

By Art Gross – Healthcare businesses are increasingly reliant on technology to manage patient information, conduct financial transactions, and communicate with staff and patients. While technology has many benefits, it also presents significant risks, including the threat of cyberattacks.