Category Archives: Security Policies and Compliance
Is Your Website ADA Compliant?
Businesses with a website must make modifications to accommodate customers with disabilities under ADA Compliance.
Conduct A ISO 27001 Risk Assessment in 7 Steps
Risk assessments are the most important part of any ISO 27001 project. They help you determine how to get your ISMS in order and keep it that way.
This Year You Should Expect Stronger Cyber Security Regulations
The government is cracking down on cyber security. According to The Wall Street Journal, and companies are expected to comply with the more stringent cyber security regulations. In early 2021, a SolarWinds and Microsoft hack occurred. They have been linked to Russia and China, respectively. President Joe Biden has issued a presidential executive order that…
Why HIPAA Compliance Matters In Telehealth
While the world has dealt with the far reaching effects of COVID-19, the healthcare industry has had to deal with many unique challenges. The procedure to protect both patients and staff from possible exposure to virus’s is a tricky process, especially when in some locations hospitals have also been dealing with patient surges. Keeping up…
Basics of FERPA – School Compliance
FERPA stands for the Family Educational Rights and Privacy Act. It was designed to protect both the privacy and security of certain kinds of educational records. It gives students, former students, auditing students, and others, certain privacy rights with respect to personally identifiable educational records. What are Educational Records? FERPA defines educational records as…
The Tiers of HIPAA violations
If you violate HIPAA, you will be fined. The penalty fee is determined by how serious the violation is. However, most cases are solved with a technical guidance from the OCR or agreeing to change your policy and procedures to prevent future violations. Financial penalties for HIPAA violations are reserved for the most serious violations…
QUICK HIPAA FACT SHEET
This quick HIPAA fact sheet will point you in the right direction! Did you know HIPAA, the Health Insurance Portability and Accountability Act was created in 1996? HIPAA is designed to maintain strict privacy over an individual’s health records. Other acronyms you need to know for HIPAA compliance: PII (Personally Identifiable Information), EPHI (Electronic Protected…
The 18 Identifiers Of PHI
In this article I will outline the 18 identifiers of Protected Health Information also known as PHI. Under the Health Insurance Portability and Accountability Act, known simply as HIPAA, PHI is any information (identifiers) about health care, health status, or payment for health care that can be linked to a specific individual. THE 18 IDENTIFIERS…
HIPAA For Business Associates
HIPAA defines business associates as a person or entity that provides services to a covered entity that involves the disclosure of PHI. What is HIPAA? HIPAA, the Health Insurance Portability and Accountability Act, was enacted in 1996 primarily to simplify the flow of healthcare information, and to make sure that all PHI (Personal Health Information)…
Is A Comcast Business Modem HIPAA Compliant?
I know the reason your here is to find out if a stand alone Comcast Business Modem can be used in a Medical Practice and pass the HIPAA compliance security check for protecting a healthcare network. Well, first there are a few things we need to know about HIPAA and Firewall Requirements. HIPAA Firewalls 101…