Healthcare Compliance
Find guidance, updates, overviews, hints and enforcement details in these subject areas: Privacy, Data Security, Workplace Safety, Clinical & Quality, State Requirements, FWA and Compliance Operations
Privacy
- Privacy Overview: Comprehensive Guide to HIPAA and Confidentiality Agreements
- Privacy Guidance: Breach Notification Rule and Rendering Unsecured PHI Unusable, Unreadable, or Indecipherable to Unauthorized Individuals
- Privacy Guidance: What are the HIPAA Rules on Surveillance Cameras and Recording?
- Privacy Guidance: What is a Designated Record Set?
- Privacy Guidance: Classifying Medical Device Companies under HIPAA
- Privacy Guidance: What is De-identified PHI and What is Re-identified PHI?
- Privacy Overview: Introduction to HIPAA
- Privacy Guidance: What is the Difference Between a Business Associate and a Business Associate Subcontractor?
- Privacy Guidance: Does HIPAA Impose Requirements on Mailing PHI?
- Privacy Guidance: When May a Covered Entity Deny a Patient Request to Amend PHI?
- Privacy Guidance: What are the HIPAA Obligations of a Covered Entity With Respect to Research?
- Privacy Guidance: What is a HIPAA Privacy Official?
- Privacy Guidance: Independent Contractor vs. HIPAA Workforce Member Classification Guide
- Privacy Overview: What is PHI? HIPAA Key Definitions to Understanding PHI
- Privacy Guidance: What is the Relationship Between HIPAA and Workers' Compensation?
- Privacy Guidance: When is a Healthcare Provider a Covered Entity Under HIPAA?
- Privacy Guidance: Are Disability Insurance Companies and Other Insurance Benefits Companies Covered Entities under HIPAA?
- Privacy Guidance: Do Patients Have the Right to Request Amendment of Their PHI?
- Privacy Guidance: What is a Confidentiality Agreement?
- Privacy Guidance: What is the Difference Between "Uses" of PHI and "Disclosures" of PHI?
- Privacy Guidance: When are Business Associates Directly Liable for HIPAA Violations?
- Privacy Guidance: What is a Covered Entity Under HIPAA?
- Privacy Guidance: What are Treatment, Payment, and Healthcare Operations Activities Under HIPAA?
- Privacy Guidance: Does the HIPAA Privacy Rule Apply to an Elementary or Secondary School?
- Privacy Guidance: When Can PHI Disclosures be Made for Judicial and Administrative Proceedings?
- Privacy Guidance: Does HIPAA Apply to Employee Health Information Maintained by Employers?
- Privacy Guidance: When is a Business Associate Agreement NOT Required?
- Privacy Guidance: Filing a Complaint With a HIPAA-Covered Entity
- Privacy Guidance: Minor Children and Parental Rights to PHI
- Privacy Guidance: What is a HIPAA Notice of Privacy Practices?
- Privacy Guidance: What is the HIPAA Privacy Rule Training Requirement?
- Privacy Overview: What is the HIPAA Privacy Rule?
- Privacy Guidance: What are the Rules on HIPAA and Research: Is a Researcher Covered by HIPAA?
- Privacy Overview: Comprehensive Guide to the HIPAA Notice of Privacy Practices
- Privacy Guidance: What is a HIPAA Business Associate Subcontractor Agreement?
- Privacy Guidance: What is HIPAA Social Media Compliance?
- Privacy Guidance: HIPAA and Workplace Wellness Programs
- HIPAA Guidance: HIPAA Privacy Rule - Right to Request Restriction of Uses and Disclosures of PHI
- Privacy Guidance: What is a HIPAA Hybrid Entity?
- Privacy Guidance: HIPAA Myth - "There are Four HIPAA Rules"
- Privacy Guidance: What are the HIPAA Breach Notification Letter Requirements?
- Privacy Guidance: What is the HIPAA Minimum Necessary Standard?
- Privacy Guidance: When is a Privacy or Security Incident Not Required to be Reported Under HIPAA?
- Privacy Guidance: What are the Sanctions Requirements Under the HIPAA Privacy Rule?
- Privacy Guidance: Must a Patient Sign a Notice of Privacy Practices or Acknowledgment of Receiving the NPP?
- Privacy Guidance: What is Verification of Identity and Authority Under the HIPAA Privacy Rule?
- Privacy Guidance: What are the HIPAA Rules on Fundraising?
- Privacy Guidance: What is a HIPAA Business Associate Agreement?
- Privacy Guidance: What are HIPAA Psychotherapy Notes? Behavioral Health and Mental Health Provider Terms
- Privacy. Guidance: Right to Request Communications of PHI By Alternative Means or at Alternative Locations
- Privacy Guidance: What are Credentialing Activities Under HIPAA?
- Privacy Guidance: What is the HIPAA Right of Access and When Must Covered Entities Respond to Right of Access Requests?
- Privacy Guidance: What is an Accounting of Disclosures of PHI?
- Privacy Guidance: What are the HIPAA Rules for the Disposal of PHI?
- Privacy Guidance: How to File a HIPAA Privacy or Security Complaint
- Privacy Guidance: What are the HIPAA Rules on the Sale of PHI?
- Privacy Guidance: What is a HIPAA Business Associate or Vendor?
- Privacy Guidance: What is the HIPAA Breach Notification Rule?
- Privacy Guidance: Do Consumers and Would-Be Patients Create PHI?
- Privacy Guidance: What is the HHS HIPAA Final Rule to Support Reproductive Healthcare Privacy?
- Privacy Overview: Negotiating Business Associate Agreements - General Information
- Privacy Overview: How Does the HIPAA Privacy Rule Protect the Confidentiality of PHI?
- Privacy Guidance: What are Limited Data Sets and Data Use Agreements?
- Privacy Guidance: When is a Vendor of a Covered Entity Not a Business Associate?
- Privacy Guidance: What is "Mitigation" under the HIPAA Privacy Rule?
- Privacy Guidance: What are Medical Record and Other Record Retention Requirements Under HIPAA?
- Privacy Guidance: What are the HIPAA Rules on Use and Disclosure of Genetic Information?
- Privacy Guidance: What are the HIPAA Rules on Marketing?
- Privacy Overview: Who is Regulated by HIPAA?
- Privacy Guidance: What are Incidental Uses and Disclosures of PHI Under HIPAA?
- Privacy Guidance: What Fees May Covered Entities Charge Individuals for Copies of their PHI?
- Privacy Guidance: What is the HIPAA Privacy Rule Documentation Requirement?
- Privacy Guidance: What is a HIPAA Authorization for Uses and Disclosures of PHI?
- Privacy Guidance: When Does the Privacy Rule Allow Covered Entities to Disclose PHI to Law Enforcement?
- Privacy Guidance: Who Can Access or Receive the PHI of Deceased Individuals?
- Privacy Guidance: Are Laboratories Covered Entities Under HIPAA?
- Privacy Overview: Comprehensive Guide - What Happens After a HIPAA Complaint is Filed?
- Privacy Guidance: Who Must be Notified of a Breach and What Information Must the Notification Contain?
- Privacy Guidance: A Comprehensive Guide to HIPAA Patient Authorization Requirements
- Privacy Guidance: What is the HIPAA Privacy Rule Right of Access? A Guide to What May be Requested and Accessed
Data Security
- Data Security Guidance: What are the HIPAA Security Rule Physical Safeguards? Workstation Security Controls
- Data Security Guidance: What is the HIPAA Security Rule Workforce Security Standard?
- Data Security Guidance: What is a HIPAA IT Disaster Recovery Plan?
- Data Security Guidance: HIPAA and Virtual Private Networks
- Data Security Guidance: What is the HIPAA Security Rule Transmission Security Standard?
- Data Security Guidance: What are the Security Rule Key Terms and Definitions?
- Data Security Guidance: What are the Proper Methods for ePHI Disposal and Destruction?
- Data Security Guidance: What is the HIPAA Security Rule Security Awareness and Training Standard?
- Data Security Guidance: Threat # 5 of the Top 5 Threats Facing the Healthcare Sector - Insider, Accidental, or Malicious Data Loss
- Data Security Overview: What is the Confidentiality of ePHI?
- Data Security Guidance: What is Risk Management Under the HIPAA Security Rule?
- Data Security Update: What are the Proposed Updates to the HIPAA Security Rule?
- Data Security Guidance: The HIPAA Right of Access Rule, Encryption, and Texting or Emailing of PHI
- Data Security Guidance: What is a HIPAA Security Official?
- Data Security Overview: What are the General Requirements of the HIPAA Security Rule?
- Date Security Guidance: What are the Components of a HIPAA Contingency Plan?
- Data Security Guidance: What is the HIPAA Security Rule Authentication Standard?
- Data Security Guidance: Job Aid for Analysis of Security of PHI
- Data Security Guidance: Threat # 3 of the Top 5 Threats Facing the Healthcare Sector - Loss or Theft of Equipment or Data
- Data Security Overview: What is the HIPAA Security Rule?
- Data Security Guidance: What Is The HIPAA Security Rule Information Access Management Standard?
- Data Security Guidance: What are HIPAA Security Rule Integrity Controls?
- Data Security Guidance: What is "Information System Activity Review" Under the HIPAA Security Rule?
- Data Security Guidance: Does the HIPAA Security Rule Require Employee Background Checks?
- Data Security Overview: What is Protected Health Information (PHI) & Electronic Protected Health Information (ePHI)?
- Data Security Guidance: What are HIPAA Security Rule Audit Controls, Audit Logs, and Audit Trails?
- Data Security Guidance: What are the HIPAA Security Rule Physical Safeguards? Workstation Use Controls
- Data Security Guidance: Federal Government Cybersecurity Resources: The 405(d) Program and HICP
- Data Security Guidance: What are the HIPAA Security Rule's "Required" vs. "Addressable" Standards?
- Data Security Guidance: What are HIPAA Data Backup Requirements?
- Data Security Guidance: What is the Integrity of ePHI?
- Data Security Guidance: What are the HIPAA Security Rule Documentation Requirements?
- Data Security Guidance: What are the HIPAA Security Rule Physical Safeguards? Device and Media Controls
- Data Security Guidance: May a HIPAA-Covered Entity Use a CSP That Stores ePHI on Servers Outside of the United States?
- Data Security Guidance: How to Implement Patching
- Data Security Guidance: What is Multi-Factor Authentication (MFA)?
- Data Security Guidance: Threat # 4 of the Top 5 Threats Facing the Healthcare Sector - Insider, Accidental, or Malicious Data Loss
- Overview: What is a Security Risk Assessment (SRA)?
- Data Security Guidance: What is the Availability of ePHI?
- Data Security Guidance: Are HIPAA-Covered Entities Required to Purchase Cybersecurity Insurance?
- Data Security Guidance: What are Best Practices for Password Selection?
- Data Security Guidance: What are Workforce Sanctions Policies Under the HIPAA Security Rule?
- Data Security Overview: HIPAA Facility Alarm and Alarm System Requirements
- Data Security Guidance: Cybersecurity and Single Sign-On
- Data Security Guidance: What are the HIPAA Security Rule Incident Response and Reporting Requirements?
- Data Security Guidance: What are the HIPAA Security Rule Physical Safeguards? Facility Access Controls
- Data Security Guidance: Where Can I Find Federal Government Cybersecurity Resources and Guidelines
- Data Security Guidance: What is the HIPAA Security Rule Evaluation Standard?
- Data Security Guidance: How to Conduct a Security Risk Analysis
OSHA Workplace Safety
Clinical & Quality
State Requirements
- State Requirements Guidance: What are the Texas HB 300 Rules on Electronic Disclosure of PHI?
- State Requirements Guidance: How Long Do Texas HB 300-Covered Entities Have To Respond to EHR (Electronic Health Record) Requests?
- State Requirements Guidance: What is "Sensitive Personal Information" Under HB 300?
- State Requirements Guidance: What are the Texas Medical Records Privacy Act Marketing Rules?
- State Requirement Guidance: Does the Texas Medical Records Privacy Act (TMRPA) Permit Reidentification of PHI?
- State Requirement Guidance: Can An Entity Be Covered by the Texas Medical Records Privacy Act and Not by HIPAA?
- State Requirement Guidance: Does Texas HB 300 Permit the Sale of PHI?
- State Requirements Guidance: Who Does HB 300 Apply To?
- State Requirements Guidance: What Entities are Exempt from the Texas Medical Records Privacy Act?
- State Requirements Guidance: What Penalties Does a TMRPA Covered Entity Face for an HB 300 Violation?
- State Requirements Guidance: What are the Texas HB 300 Training Requirements?
Fraud, Waste & Abuse
Compliance Operations
- Compliance Operations Tip: Forms Required by HIPAA and Forms Not Mentioned or Required by HIPAA
- Compliance Operations Overview: What are the Differences Between "Policies" and "Procedures"?
- Compliance Operations Overview: What is MACRA MIPS?
- Compliance Operations Tip: What is HHS' Guidance on the Use of Online Tracking Technologies?
- Compliance Operations Tip: Where Are HHS Resources for the Change Healthcare Cyberattack?
- Compliance Operations Tip: How Can I Use Compliancy Group's Software, The Guard, to Work on My HIPAA Security Risk Assessment?
- Compliance Operations Tip: Where Can I Find Federal Government and HHS Resources for HIPAA?
- Compliance Operation Tip: Completing The Breach Determination Assessment Form
- Compliance Operation Tip: Compliancy Group's HHS OCR HIPAA Audit Response Program
- Compliance Operations Overview: The Seven Fundamental Elements of an Effective Compliance Program
- Compliance Operations Tip: What is the Difference Between an OCR HIPAA Settlement and an OCR HIPAA Fine (Civil Monetary Penalty)?