Looking for a Business Associate Agreement? Download our FREE starter template.
Total HIPAA Logo

THE TOTAL HIPAA

Resource Library

Featured Articles

How to Use HIPAA to Defend Against Common Cybersecurity Attacks

How to Use HIPAA to Defend Against Common Cybersecurity Attacks

While much of the anti-malware technology we have to protect us from hackers has become increasingly more ...
Microsoft Announces End of Support for Internet Explorer

Microsoft Announces End of Support for Internet Explorer

Internet Explorer was once one of the biggest players in the browser game, but now it’s coming to its end of days. ...
Protected Health Information (PHI): Everything You Need to Know about HIPAA and PHI

Protected Health Information (PHI): Everything You Need to Know about HIPAA and PHI

What is Protected Health Information (PHI)? The Health Insurance Portability and Accountability Act (HIPAA) is a ...
Can You Share PHI Over Phone or Text?

Can You Share PHI Over Phone or Text?

We live in a fast-paced, digital world where information is shared more quickly than it ever has been. Between ...
What is NIST 800-50 and How Should It Inform Your HIPAA Training?

What is NIST 800-50 and How Should It Inform Your HIPAA Training?

For organizations that deal with sensitive client or employee information, (e.g., Medical Practices, Employer ...
How HIPAA Safeguards Can Help You Safely Transmit PHI

How HIPAA Safeguards Can Help You Safely Transmit PHI

For organizations handling Protected Health Information (PHI), cybersecurity attacks and other security threats ...
New OCR Guidelines for Defending Against Cybersecurity Attacks

New OCR Guidelines for Defending Against Cybersecurity Attacks

In a recent statement, President Biden encouraged private sector companies to give increased attention to their ...
Password Best Practices Are Changing. How Should You Adapt?

Password Best Practices Are Changing. How Should You Adapt?

As technology becomes more and more sophisticated, so do the strategies hackers use in data breaches. Now more ...
HIPAA and ERISA: Everything You Need to Know

HIPAA and ERISA: Everything You Need to Know

If you’ve been taking concrete steps towards implementing and maintaining HIPAA compliance across your ...
Deadline for Reporting Small HIPAA Breaches Is March 1st

Deadline for Reporting Small HIPAA Breaches Is March 1st

HIPAA breaches involving fewer than 500 individuals which occurred during 2021 must be reported to the US ...
Top 10 Total HIPAA Blogs of 2021

Top 10 Total HIPAA Blogs of 2021

Throughout 2021, Total HIPAA has focused on providing information that will keep your organization HIPAA compliant ...
The Ohio Data Protection Act and HIPAA Compliance

The Ohio Data Protection Act and HIPAA Compliance

Every day, there seems to be a new headline about another organization whose data security has been breached. It’s ...
What You Need to Do to Be HIPAA Compliant After Signing a BAA

What You Need to Do to Be HIPAA Compliant After Signing a BAA

Before agreeing to trust another business with your data, there are several precautions you need to take. Firstly, ...
How to Ensure HIPAA Compliance While Storing PHI on the Cloud

How to Ensure HIPAA Compliance While Storing PHI on the Cloud

For healthcare companies, cloud data storage is a popular and practical alternative. The worldwide Healthcare ...
Your Cybersecurity Questions Answered!

Your Cybersecurity Questions Answered!

Thanks to everyone who attended our November 4th webinar, Don’t Become the Next Cybersecurity Scary Story! We are ...
How to Maintain HIPAA Compliance in Public Cloud Environments

How to Maintain HIPAA Compliance in Public Cloud Environments

The benefits of public cloud computing solutions make them very attractive to all types of businesses. One of the ...
Password Manager Recommendations for Simpler, Better Security

Password Manager Recommendations for Simpler, Better Security

A Password Manager Can Help Pave the Way to HIPAA Compliance We’re all storing more information online than ...
Why You Should Be Using Two-Factor Authentication

Why You Should Be Using Two-Factor Authentication

While strong, complex passwords are an effective first line of defense when securing business accounts and ...
PHI Retention: How Long Should You Hold on to Protected Health Information?

PHI Retention: How Long Should You Hold on to Protected Health Information?

Do you need to retain PHI after termination of a contract? There are several different answers to this question, ...
HIPAA Compliant efax Provider Recommendations

HIPAA Compliant efax Provider Recommendations

Many HIPAA compliant organizations need to send and receive electronic Protected Health Information (ePHI) on a ...

Take control of your compliance.

Man
Save & Share Cart
Your Shopping Cart will be saved and you'll be given a link. You, or anyone with the link, can use it to retrieve your Cart at any time.
Back Save & Share Cart
Your Shopping Cart will be saved with Product pictures and information, and Cart Totals. Then send it to yourself, or a friend, with a link to retrieve it at any time.
Your cart email sent successfully :)

[el.selectedIndex]
[el.selectedIndex]
[fieldObj.selectedIndex]
[fieldObj.selectedIndex]
[el.selectedIndex]
[el.selectedIndex]
[fieldObj.selectedIndex]
[fieldObj.selectedIndex]
[el.selectedIndex]
[el.selectedIndex]
[fieldObj.selectedIndex]
[fieldObj.selectedIndex]