• Home
  • Blog
  • Contact
HIPAA ComplianceHIPAA Compliance
HIPAA ComplianceHIPAA Compliance
  • Home
  • Blog
  • Contact

Person or Entity Authentication: What to Do and How to Do It

Jul 9, 2009

In our series on the HIPAA Administrative Simplification Security Rule, this is the fourth Technical Safeguard Standard.  There is not...

Access Control: Automatic Logoff-What to Do and How to Do It

Jun 5, 2009

In our series on the HIPAA Administrative Simplification Security Rule, this is the third implementation specification for the Technical Safeguard...

Access Control: Unique User Identification-What to Do and How to Do It

Jun 3, 2009

In our series on the HIPAA Administrative Simplification Security Rule, this is the first implementation specification for the Technical Safeguard...

Physical Safeguard Standard, Workstation Use-What to Do and How to Do It

May 13, 2009

In our series on the HIPAA Administrative Simplification Security Rule, Workstation Use is the second Physical Safeguard Standard.  There is...

Categories

  • 5010
  • American Recovery and Reinvestment Act
  • Enforcement
  • GINA
  • Health Care Reform
  • Health IT and HITECH
  • HIPAA Law
  • Identifiers
  • Meaningful Use
  • Privacy
  • Red Flags Rules
  • Security
  • Transactions & Code Sets
  • Uncategorized

Recent Posts

  • Contracting with Vendors that are NOT HIPAA Business Associates: Best Practices
  • HIPAA Breach: Who You Gonna Call?
  • Can I Be Sued for a HIPAA Violation?
  • Business Associate Agreements – a First Look at Indemnification
  • Gmail, Google Apps for Business HIPAA Business Associate Agreements

Archives

Contact Us

We're currently offline. Send us an email and we'll get back to you, asap.

Send Message
HIPAA- Health Insurance Portability Accountability Act

© 2023 · hipaa.com