- Home
- » Corporate Compliance Main Page
- » Newsletters
- » Briefings on HIPAA
- » Newsletters
- » Corporate Compliance Main Page
Corporate Compliance Newsletters
Briefings on APCs Briefings on Coding Compliance Strategies Briefings on HIPAA Strategies for Health Care Compliance

How can you minimize the impact of HIPAA? Subscribe to Briefings on HIPAA, your health information management resource for complying with information privacy & security regulations. Get help with rewriting contracts with business partners, telling patients about how their information is being used, and establishing privacy-conscious business practices.
2016
|
2015
|
2014
|
2013
|
2012
|
2011
|
2010
|
2009
|
2008
|
2007
|
2006
|
2005
|
2004
|
2003
|
2002
|
2001
Issue 11, November 1, 2016 - VIEW THE FULL ISSUE
-
Small breaches could become a big problem
In a year of high-profile, multimillion dollar settlements for large HIPAA breaches, OCR raised... -
Exciting updates: More content, tools, and news at your fingertips!
The challenges healthcare professionals tackle each day don’t wait for solutions, and neither... -
The cost of a data breach
Data breaches -
Is HIPAA enough?
HIPAA breaches haven't become less common. If the law was, in part, meant to reduce the amount of... -
Prevalent Vendor Assess evaluates third-party vendors' HIPAA compliance
Much of today's healthcare industry is reliant on third-party vendors. If you haven't asked your... -
BAAs, faxing, and customer surveys
Q: I recently received a customer satisfaction survey from a medical supply company. The survey... -
Tips from this month's issue
Tips from this month's issue
Issue 10, October 1, 2016 - VIEW THE FULL ISSUE
-
Conducting a phase two audit self-review
Conducting a self-review based on the audit protocols can help BAs prepare for desk audits; it can... -
Staying HIPAA compliant on social media
Social media is everywhere—even inside the walls of hospitals. Staff may log into personal... -
Security Q&A: EHR notes, encrypting email, and telehealth security
Q: Our clinic sends appointment reminders via text message to patients. Patients are given the... -
Tips from this month's issue
Tips from this month's issue
Issue 9, September 1, 2016 - VIEW THE FULL ISSUE
-
Phishing for PHI
Cyber threats continue to grow and evolve, but most share a similar origin: phishing. Phishing... -
Is OCR ready to get proactive about HIPAA?
The Office for Civil Rights (OCR) stepped up HIPAA enforcement in a big way this year. The agency... -
Communicating with leadership
Threats to PHI are coming fast and furious. Although many organizations are ready to take HIPAA... -
HITRUST security risk assessment
There are no federally recognized HIPAA certification standards for covered entities (CE) and... -
HIPAA Q&A: BAAs, fax logs, and cell phone use
Q: We recently received a request for a patient's records. The patient transferred to another...
Issue 8, August 1, 2016 - VIEW THE FULL ISSUE
-
Ransomware is a new twist on an old crime
Hackers and malware are routine threats for most healthcare organizations, but this year saw... -
Securing paper in a digital world
Paper records persist despite healthcare's steady move to purely electronic documentation. Although... -
Medical identity theft: Part 2
PHI is a bankable commodity. Hackers steal data and sell it to fraudsters. Individuals borrow or... -
Security Q&A: USB drive and hard drive encryption and bio-waste disposal
Q: If my medical waste includes PHI, do I need a BAA with our waste management vendor? A: Yes. For... -
Privacy and security primer
Tips from this month's issue
Issue 7, July 1, 2016 - VIEW THE FULL ISSUE
-
Phase 2 audit protocol
HIPAA audits Phase 2 audit protocol As Phase 2 of the HIPAA audit program begins, covered... -
Medical identity theft: Part 1
Protecting patients' identities Medical identity theft: Part 1 Editor's note: This is part one of... -
Creating and conducting an organizationwide risk analysis: Part 2
Risk analysis Creating and conducting an organizationwide risk analysis: Part 2 Editor's note... -
Maize Analytics audit log tool
Product watch Maize Analytics audit log tool by Chris Apgar, CISSP Information systems activity... -
Breach notifications, granting access to providers, and disclosing pediatric patient information
HIPAA Q&A by Mary D. Brandt, MBA, RHIA, CHE, CHPS Q: Is it permissible to take pictures of... -
Privacy and security primer
Tips from this month's issue.
Issue 6, June 1, 2016 - VIEW THE FULL ISSUE
-
Responding to privacy and security breaches
Security incident plan Responding to privacy and security breaches A breach of PHI is the last... -
Creating and conducting an organizationwide risk analysis: Part 1
Risk analysis Creating and conducting an organizationwide risk analysis: Part 1 Editor's note... -
Release of information: The HIPAA Omnibus Rule and the HITECH Act
The Health Information Technology for Economic and Clinical Health (HITECH) Act, part of the larger... -
Security Q&A: Creating secure passwords, guest wireless networks, and emailing PHI
Security Q&A Creating secure passwords, guest wireless networks, and emailing PHI by Chris... -
Tips from this month's issue
Tips from this month's issue
Issue 5, May 1, 2016 - VIEW THE FULL ISSUE
-
Ready or not, Phase 2 audits are here
HIPAA audits Ready or not, Phase 2 audits are here OCR's long-awaited Phase 2 HIPAA Audit... -
Tips for small entities charged with HIPAA compliance
Never too small to be compliant Tips for small covered entities charged with HIPAA... -
NCC Group's Piranha phishing simulation
Product watch NCC Group's Piranha phishing simulation by Chris Apgar, CISSP "Don't click... -
HIPAA Q&A: PHI and marketing, disclosure of mental health information, and revising NPPs
HIPAA Q&A PHI and marketing, disclosure of mental health information, and revising... -
Tips from this month's issue
Tips from this month’s issue
Issue 4, April 1, 2016 - VIEW THE FULL ISSUE
-
Responding to subpoenas
Subpoenas are a sometimes-unwelcome fact of life for privacy officers. They can be complicated... -
Audits or investigations, they're not going away
OCR and HIPAA audits. Give you chills, don't they? Most covered entities (CE) naturally fear... -
On the road to interoperability
Interoperability isn't a new goal, but 2016 may be the year it becomes closer to a reality. HHS... -
Email encryption, file sharing, and mailbox security
Security Q&A Email encryption, file sharing, and mailbox security by Chris Apgar... -
Tips from this month's issue
Tips from this month's issue
Issue 3, March 1, 2016 - VIEW THE FULL ISSUE
-
Sending faxes: Avoid misdirected faxes with common process steps
Faxing, like many other efforts to protect health information, comes down to basics. Call... -
Getting the message: Evaluating and using secure email and text messaging
To find the right solution for your organization, you must understand how and why employees are... -
EiQ's security monitoring software offers round the clock protection
Product Watch -
HIPAA Q&A: You've got questions! We've got answers!
Q: I work in a behavioral health hospital and am looking for guidance relating to disclosures as... -
Privacy and security primer
Tips from this month's issue.
Issue 2, February 1, 2016 - VIEW THE FULL ISSUE
-
HIPAA training and awareness
Prevention is better than a cure. In the world of HIPAA privacy and security, training and... -
Connecting information security officers and internal auditors
Security officers may sometimes feel that they're asked to do too much with too little... -
HIPAA Q&A: You've got questions! We've got answers!
Submit your HIPAA questions to Associate Editor Nicole Votta at nvotta@hcpro.com and we will work... -
Privacy and Security Primer
Tips from this month's issue