HIPAA/HITECH Compliance
Consulting, Assessment and Compliance has never been as easy! A simplified process for achieving continuous compliance, so you can keep your focus on growth.
When working with Electronic Protected Health Information (ePHI), we help in identifying and determining the scope and vulnerabilities involved to help successfully comply
Identify, analyze, create and put measures in place to resolve the actions by completing a comprehensive risk assessment for all health data.
Our Data security tools and BAs can guide your organization to successful compliance and maximum security. And also provide continued support.
ePHI Inventory Scoping and Profiling
Security Risk Analysis Report
HIPAA/HITECH Assessment Report
Risk Management Plan
Customized Policies and Procedures
Online User Training
Executive Summary Report
Portal Access
Privacy rule sets the national standards for a patient’s rights to PHI. This includes a patient’s rights to access PHI and health care provider’s rights to deny access to PHI. However, the HIPAA privacy rule only applies to covered entities and not business entities.
The HIPAA Security Rule sets the national standards for security, transmission, and handling of ePHI. This outlines the criteria for the safety of ePHI. These standards include physical, administrative, and technical safeguards that health organizations must have in place.
This rule covers the standards that covered entities, and business associates must follow in the event of a PHI or ePHI data breach. It requires organizations to report all breaches. The specific protocols for reporting depend on the type of breach
This rule was amended to the HIPAA regulation to extend the application of HIPAA to business associates, in addition to covered entities. This rule mandates that business associates must be HIPAA compliant.