Marti Arvin wrote an article on managing business associate risks that appeared in the March 2018 edition of Compliance Today. Read the article here.
Home » Privacy Officer or Professional » Business associates: Have you really integrated them into your risk profile?
Other content in this Stream
Cyber Incidents in Healthcare: How Much Would You Pay?
Medicaid Data Breach Trends: An Analysis
Texas Retirement Agency Portal Breach Affects 1.25 Million
A CIO guide to building a dashboard for cybersecurity
Anthem Mega-Breach: Record $16 Million HIPAA Settlement
Aetna Hit With More Penalties for Two Breaches
HIPAA lets providers text patients, but is it secure?
Why Is Providing Patients Access to Records So Challenging?
HHS OIG Launches Cybersecurity Web Page
Changes to New California Privacy Law Exempts Some Healthcare Organizations
Much has been written about the potential impacts that the California Consumer Privacy Act of 2018 (CaCPA) could make on health care organizations and their business partners. The California...
Ethical hacking: What to look for in a pen tester
Responding to Ransomware Attacks: Critical Elements
Opioid Crisis Raises Tough Privacy Issues
Hospitals Fined $1 Million After TV Crews Film Patients
Hospital Insider PHI Theft Case: Lessons to Learn
User Access Monitoring: Convincing Your Governing Body that You Need to do This
User access monitoring is a requirement under the HIPAA Security Rule. However, the specifics of what must be done remain a little cloudy. The regulations state, “implement hardware, software,...
Are State AGs Picking Up Slack in HIPAA Enforcement?
David Holtzman was recently interviewed by Marianne Kolbasuk McGee of Information Security Media Group about The Arc of Erie County lawsuit which encountered a data breach that impacted more than...
Healthcare Cybersecurity: Helping the Little Guy
Five Best Practices to Improve Your Third-Party Risk Management Program
CynergisTek's Senior Director, Security Services Operations David Rauschendorfer recently wrote a blog post describing several steps healthcare organizations should take to manage potential third-part
WHA Emergency Prep Conference: Cybersecurity in Health Care, October 23