Looking for a Business Associate Agreement? Download our FREE starter template.
Total HIPAA Logo

THE TOTAL HIPAA

Resource Library

Featured Articles

How Long Should you Hold on to Protected Health Information (PHI)?

How Long Should you Hold on to Protected Health Information (PHI)?

How long should a Covered Entity, Business Associate or Subcontractor hold onto PHI after termination of a ...
Using a Virtual Private Network (VPN) vs. SSL / TLS in a HIPAA Environment

Using a Virtual Private Network (VPN) vs. SSL / TLS in a HIPAA Environment

Whether you’re working from home, your local coffee shop, or from the airport between layovers, you will likely ...
Microsoft End of Support for 2019

Microsoft End of Support for 2019

Every year, we publish Microsoft's End of Support list because using up-to-date programming is key for HIPAA ...
Proper Disposal of PHI In Accordance With HIPAA

Proper Disposal of PHI In Accordance With HIPAA

Disposal of PHI is one of the things many people neglect when dealing with Protected Health Information. Let's ...
Preparing Contractors for HIPAA Compliance

Preparing Contractors for HIPAA Compliance

Employers are responsible for contractors and temporary employee’s compliance with HIPAA. Here are two ...
November is Cybersecurity Awareness Month

November is Cybersecurity Awareness Month

Implementing cybersecurity policies is one of the most effective ways to protect your clients’ or employees’ PHI. ...
Notice of Privacy Practices (NPP) – Most People’s Connection to HIPAA

Notice of Privacy Practices (NPP) – Most People’s Connection to HIPAA

When you mention HIPAA, most people reference the Notice of Privacy Practices (NPP) they received at the hospital, ...
HIPAA Sanction Policies: What Employees and Employers Need to Know

HIPAA Sanction Policies: What Employees and Employers Need to Know

When it comes to HIPAA law, the sanction policy is one of the most important factors employees must be aware of. ...
How to Ensure the Safety of Your Backups

How to Ensure the Safety of Your Backups

We have witnessed an explosion of technological innovation since HIPAA was enacted in 1996. Most businesses swapped
Data Breach: 10 Ways to Prevent This Potential Nightmare

Data Breach: 10 Ways to Prevent This Potential Nightmare

This month, we devoted multiple blog posts to covering major HIPAA violations and their penalties. Today’s post ...
HIPAA and Cloud Computing

HIPAA and Cloud Computing

On October 7, 2016, HHS released a guidance on HIPAA and cloud computing.¹ As the use of cloud computing continues ...
How to Dispose of Electronic Devices if You Are Dealing With Electronic Protected Health Information

How to Dispose of Electronic Devices if You Are Dealing With Electronic Protected Health Information

People get rid of electronic devices all the time. There’s always a newer, stronger, more sophisticated version of ...
Block Hackers with HIPAA Training

Block Hackers with HIPAA Training

HIPAA Rules require that your organization provide training to employees on privacy and security awareness. ...
WARNING: Your Fax Machine Could be Used to Hack You!

WARNING: Your Fax Machine Could be Used to Hack You!

American businesses have used fax machines to transmit images via telephone lines since the late 1980s. Now, almost
How a VPN Can Help with HIPAA Compliance

How a VPN Can Help with HIPAA Compliance

Jason Karn, Chief Compliance Officer at Total HIPAA, recently discussed the importance of a VPN for groups that ...
HIPAA Demands Smart Decisions for Smart Phones

HIPAA Demands Smart Decisions for Smart Phones

If you had to guess how many Americans use a smartphone, what would your answer be? If it seems to you like they’re

Cyber Thieves Thrive During Natural Disasters-Test

What better time to exploit the kindness of well-meaning people who want to help victims than during natural ...
Attacks on Email Accounts are on the Rise!

Attacks on Email Accounts are on the Rise!

The threat of compromised business email spans across all industries. From healthcare to manufacturing – both large
A Managed Service Provider Can Assist Your Company To Meet HIPAA Compliance Requirements

A Managed Service Provider Can Assist Your Company To Meet HIPAA Compliance Requirements

Healthcare providers, health insurance agents, employers that provide health benefits, and business associates that
Aetna Launches Broker Encryption Requirement

Aetna Launches Broker Encryption Requirement

This week, we break down Aetna's new broker encryption requirement. Read on to learn all you need to know about ...

Take control of your compliance.

Man
Save & Share Cart
Your Shopping Cart will be saved and you'll be given a link. You, or anyone with the link, can use it to retrieve your Cart at any time.
Back Save & Share Cart
Your Shopping Cart will be saved with Product pictures and information, and Cart Totals. Then send it to yourself, or a friend, with a link to retrieve it at any time.
Your cart email sent successfully :)