How-to Documents
Short videos that answer common “How-To” questions providers face on a regular basis. This section will continue to grow as new videos are added to the library.
How to Property Handle Breach Notification and Reporting
Conducting a Security Risk Assessment
When an Authorization is and isn’t Required
What constitutes Protected Health Information
Explaining HIPAA to Individuals Served
How to Conduct a Privacy Risk Assessment
How to Conduct a Privacy Program Gap Analysis
How to Recognize a Phishing Attack
Responding to Subpoenas and Search Warrants
Is Cloud Storage HIPAA Compliant?
What is treatment-payment-operations?
Recorded Webinars
What does it mean to be 'HIPAA Compliant': The four rules that every covered entity must follow.
Conducting a root cause analysis.
Cloud Storage - Is it HIPAA Compliant?
The First 48 Hours - Incident Response after a Breach.
Text Messaging and E-mail - Are they the PHI black hole?
Working Remotely - Impact of the Security Rule
OCR Proposed Changes to HIPAA - What They Could Mean to Community Providers
Why a Disaster Recovery Plan is Important
Exclusion Screening