PHI Safeguard Compliance Requirements for HIPAA/HITECH and MU – Part 4
PHI Compliance Requirements Webinar Questions/Answers – Part 4 On July 30, 2014 we hosted a webinar event with national HIPAA expert, Edward Jones. The event…
Read MorePHI Compliance Requirements Webinar Questions/Answers – Part 4 On July 30, 2014 we hosted a webinar event with national HIPAA expert, Edward Jones. The event…
Read MoreProtecting Data Assets and Managing Risks June 16-17, 2014, San Diego, California HIMSS Media and Healthcare IT News are joining forces again to bring you The…
How to Conduct a Rigorous Security Risk Analysis By Bob Chaput, CEO of Clearwater Compliance LLC Last year, HIPAA privacy, security and breach notification rules…
Is Your Meaningful Use Risk Analysis Complete? By Mike Semel Blog: 4Medapproved.com/HITSecurity Twitter: @SemelConsulting EHR System – The Tip of the Iceberg Many times during…
Health IT Myths: Fact or Fiction Today is all about the spin. You can take a statement, a piece of information, or even a fact…
HIPAA Omnibus Final Rule Brings Sweeping Changes It has been ten days since the US Department of Health and Human Services (HHS) Office for Civil Rights…
Meaningful Use Attestation for Security Risk Analysis One of the meaningful use core objectives for Eligible Professionals and Eligible Hospitals is to protect electronic health…
Meaningful Use Attestation: A Word to the Wise on Audits The CMS EHR Incentive Program is going full bore. Over $390,000,000 was paid out in…
MU Live! Turns to Meaningful Use Core Measure 15 We’re finishing up  our second month of hosting MU Live!, our bi-monthly 30 minute webcast that…