• Home
  • Blog
  • Contact
HIPAA ComplianceHIPAA Compliance
HIPAA ComplianceHIPAA Compliance
  • Home
  • Blog
  • Contact

Red Flags Rules Compliance Countdown: 3 days

Apr 28, 2009

The Federal Trade Commission’s (FTC’s) red flags rules for financial institutions and creditors to fight identity theft require compliance by...

FTC’s “Red Flags” Rule to Prevent Identity Theft Requires Compliance by Healthcare Providers on Friday, May 1, 2009

Apr 27, 2009

The Federal Trade Commission’s (FTC’s) “red flags” rules for financial institutions and creditors to fight identity theft require compliance by...

Identity Theft Red Flags and Address Discrepancies

Apr 27, 2009

DEPARTMENT OF THE TREASURY 12 CFR Part 41, 222, 334, 364, 571 and 717 16 CFR Part 681 Idendity Theft...

Facility Access Controls: Facility Security Plan-What to Do and How to Do It

Apr 27, 2009

In our series on the HIPAA Administrative Simplification Security Rule, this is the second implementation specification for the Physical Safeguard...

Facility Access Controls: Contingency Operations-What to Do and How to Do It

Apr 24, 2009

In our series on the HIPAA Administrative Simplification Security Rule, this is the first implementation specification for the Physical Safeguard...

Facility Access Controls: What This HIPAA Security Rule Physical Safeguard Standard Means

Apr 23, 2009

This is the first Physical Safeguard Standard of the HIPAA Administrative Simplification Security Rule. It has four implementation specifications: contingency...

Physical Safeguard Standards of the HIPAA Administrative Simplification Security Rule

Apr 22, 2009

There are four physical safeguard standards: facility access controls, workstation use, workstation security, and device and media controls. Each standard...

Pay attention to HITECH Act Definition of Breach: Lost Customers Big Cost Factor

Apr 16, 2009

The April 2009 issue of Baseline  magazine has an article by Corinne Bernstein entitled: “The Cost of Data Breaches,” which...

Contingency Plan: Applications and Data Criticality Analysis-What to Do and How to Do It

Apr 9, 2009

In our series on the HIPAA Administrative Simplification Security Rule, this is the fifth implementation specification for the Administrative Safeguard...

Contingency Plan: Testing and Revision Procedures-What to Do and How to Do It

Apr 8, 2009

In our series on the HIPAA Administrative Simplification Security Rule, this is the fourth implementation specification for the Administrative Safeguard...

  • 1
  • 2
  • 3
  • 4

Categories

  • 5010
  • American Recovery and Reinvestment Act
  • Enforcement
  • GINA
  • Health Care Reform
  • Health IT and HITECH
  • HIPAA Law
  • Identifiers
  • Meaningful Use
  • Privacy
  • Red Flags Rules
  • Security
  • Transactions & Code Sets
  • Uncategorized

Recent Posts

  • Contracting with Vendors that are NOT HIPAA Business Associates: Best Practices
  • HIPAA Breach: Who You Gonna Call?
  • Can I Be Sued for a HIPAA Violation?
  • Business Associate Agreements – a First Look at Indemnification
  • Gmail, Google Apps for Business HIPAA Business Associate Agreements

Archives

Contact Us

We're currently offline. Send us an email and we'll get back to you, asap.

Send Message
HIPAA- Health Insurance Portability Accountability Act

© 2023 · hipaa.com