Looking for a Business Associate Agreement? Download our FREE starter template.
Total HIPAA Logo

THE TOTAL HIPAA

Resource Library

Your best source for HIPAA compliance news and information

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Featured Resources

HIPAA 101 Cover

Free Download: HIPAA 101

How well do you meet basic HIPAA regulations? Our HIPAA Compliance 101 resource outlines the key considerations that you will need to ensure you stay HIPAA Compliant.
Download Now →

Security Webinar Cover

Free Webinar: Annual HIPAA Requirements & Security Standards

In this webinar, we discussed annual HIPAA requirements, document review, and the compliance procedures you need to have in place to prevent breaches and pass audits.
Watch Now →

Explore Resources

A Data Breach Affects Your Wallet – and Your Reputation

A Data Breach Affects Your Wallet – and Your Reputation

When you prepare for HIPAA compliance, you may not immediately think about the possibility of a data breach and ...
The Ins and Outs of Risk Management

The Ins and Outs of Risk Management

Risk Assessment and Risk Management A Risk Assessment1 is a first step in protecting your organization, but it ...
My Business Just Experienced a Cyber-Attack!

My Business Just Experienced a Cyber-Attack!

What's New? Health and Human Services, Office for Civil Rights (HHS OCR) released a cybersecurity checklist and ...
5 Common HIPAA Mistakes

5 Common HIPAA Mistakes

Now more than ever, HIPAA compliance is a must. It’s hard to believe, but HIPAA errors found to be violations can ...
HIPAA Compliance Will Stop Ransomware’s Damage

HIPAA Compliance Will Stop Ransomware’s Damage

On average, there have been 4,000 daily ransomware attacks since early 2016, an increase of 300% from the 1,000 ...
WannaCry Ransomware Protection with HIPAA

WannaCry Ransomware Protection with HIPAA

WannaCry, WannaCrypt, Wana Decryptor or WCry, whatever it is called, ransomware has been spreading through over ...
Creating and Managing Passwords

Creating and Managing Passwords

How many times a day do you access applications or websites that require passwords? The temptation is to make ...
Malicious Social Engineering and HIPAA

Malicious Social Engineering and HIPAA

Spam accounts for 65% of the total volume of global internet email traffic according to Cisco’s 2017 Annual ...
HIPAA Violations Every Day and Every Size

HIPAA Violations Every Day and Every Size

We frequently get questions about whether or not an event is a HIPAA violation. Some of the events are hazy, ...
HIPAA and Medical Records Retention Requirements by State

HIPAA and Medical Records Retention Requirements by State

The Health Insurance Portability and Accountability Act (HIPAA) requires Covered Entities and Business Associates ...
Auditing Business Associates

Auditing Business Associates

Have you Audited your HIPAA Business Associates? This question comes up frequently when we are working on HIPAA ...
Implementing HIPAA is More Than Meeting Government Regulations

Implementing HIPAA is More Than Meeting Government Regulations

Recently, I was on a vacation in Germany, and as I visited several medieval cities, I had two thoughts. First, ...
The FTC Act and HIPAA Protect the Same Information

The FTC Act and HIPAA Protect the Same Information

You collect Personally Identifiable Information (PII) about your patients, employees and clients, which can be ...
Microsoft End of Support for 2017

Microsoft End of Support for 2017

Note: We update this list every year. To see the most recent version of this post, click here. There are numerous ...
It’s Time to Report Small Breaches

It’s Time to Report Small Breaches

Deadline for Reporting HIPAA Breaches Affecting Fewer than 500 Individuals ­­– February 28, 2017   HIPAA breaches ...
Are You Prepared for Ransomware?

Are You Prepared for Ransomware?

Both large and small businesses are warned about hackers getting into their files and demanding a ransom in order ...
HIPAA and Cloud Computing Part II

HIPAA and Cloud Computing Part II

Health and Human Services (HHS), Office of Civil Rights’ (OCR) Phase 2 of the HIPAA Audit Program is scheduled to ...
Encrypting Devices

Encrypting Devices

Most electronic devices come with the ability to encrypt the internal drive. Encrypting your data adds an extra ...
HIPAA Compliant Email Encryption Review

HIPAA Compliant Email Encryption Review

Covered Entities, Business Associates and Business Associate Subcontractors are required to protect the PHI they ...
OCR’s Phase 2 of HIPAA Audit Program Focuses on Business Associates

OCR’s Phase 2 of HIPAA Audit Program Focuses on Business Associates

The Department of Health and Human Services’ (HHS) announcement that they will begin auditing Business Associates ...

Take control of your compliance.

Take Control of Your Compliance
Save & Share Cart
Your Shopping Cart will be saved and you'll be given a link. You, or anyone with the link, can use it to retrieve your Cart at any time.
Back Save & Share Cart
Your Shopping Cart will be saved with Product pictures and information, and Cart Totals. Then send it to yourself, or a friend, with a link to retrieve it at any time.
Your cart email sent successfully :)