In this blog we discuss when you can text patients, what the regulations are, and the appropriate reasons and times for texting. We will also be discussing the advantages of using a texting service.
Organizations should identify the roles assigned to each statement within the policy. Mapping policy commitments to requirements and roles creates a shared responsibility matrix.
In this blog we explore exactly what spam is, and how it compares to other forms of malware. Specifically, how it compares to phishing, as the two methods of social engineering are so similar.
So how do you go about upholding these guidelines to protect all of this information? Why, through the HIPAA Privacy and Security Rules of course! These terms may sound interchangeable, but don’t let them fool you! They both have their own distinct roles to play when it comes to HIPAA as a whole.
HIPAA contains some of the most detailed and comprehensive requirements of any privacy and data security law to date, but I’m getting ahead of myself. Let’s go back to before there was federal protection of health information. Why was it created in the first place?
There are a variety of different HIPAA consent forms that both patients and covered entities will likely come into contact with. In order to understand your rights and legal duties, it is important to to understand these legal forms.
In this blog post, we give you an overview of HIPAA compliance for dental offices. We cover what the regulation requires and some best practices for staying compliant.
Almost 70% of Americans say that it’s their general practice to not answer the phone. At some point or another, you’re going to have no choice but to leave a voicemail for your clients. Here’s how to do it in a HIPAA compliant way.
Since HIPAA breach notification letters are a listed requirement required, it behooves every healthcare organization to prepare them as templates. Here are effective template examples.