Healthcare Compliance Updates & Tips

Checkout the latest regulatory compliance updates and tips from ComplyAssistant.
On top of our updates and tips we often publish free tools and webinars to help the compliance community.

Fundamental Purchasing Guide for Vendor Risk Management Software

Are you looking to purchase vendor risk management software for your healthcare organization? Our fundamental guide outlines the features and functionality to look for when evaluating solutions, along with an expanded definition of what constitutes a “business associate” and the types of business data to be protected when working with third parties.

Read more...

4 Security and Compliance Predictions for 2020

Over the course of 2019, we covered a variety of security and compliance topics, including security risk audits, HIPAA compliance, employee compliance training, and executive leadership and IT governance.

Though these issues are still relevant going into a new decade, we predict a renewed – or even evolved – outlook on four specific areas of security and compliance strategy.

Read more...

Governance Report Cards = Better Compliance Budgeting

Just like other operational and clinical areas of a healthcare system, the right metrics can help you understand current state in your compliance and security strategy and help guide decisions for how your organization should allocate funding for health IT projects related to governance, risk, and compliance.

But, where to begin? Using a quarterly governance report card is an efficient way to gather data and see trending over time. Start with our top seven metrics to gather on your report card:

Read more...

PHI Hide and Seek – Hidden PHI Carries High Financial Risk

The technology storm of the past three decades has made access to electronic protected health information (ePHI) easier, which benefits patient care in an ever-fragmented delivery system, but is bad for information security. Protected health information (PHI) can be found in virtually every corner of a healthcare system, concealed in unlikely places. With each new technology, acquisition, or merger comes new vulnerabilities that may remain unseen until the right assessments are performed to uncover them.

Read more...