Looking for a Business Associate Agreement? Download our FREE starter template.

Register for our FREE webinar, “Navigating HIPAA Compliance in 2022,” on Wed. Jan 26 @ 2pm EST. Learn More →

Total HIPAA Logo

THE TOTAL HIPAA

Resource Library

Featured Articles

A History of HIPAA: 8 Things You Should Know

A History of HIPAA: 8 Things You Should Know

The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996 to protect American families ...
A Data Breach Affects Your Wallet – and Your Reputation

A Data Breach Affects Your Wallet – and Your Reputation

When you prepare for HIPAA compliance, you may not immediately think about the possibility of a data breach and ...
The Ins and Outs of Risk Management

The Ins and Outs of Risk Management

Risk Assessment and Risk Management A Risk Assessment1 is a first step in protecting your organization, but it ...
My Business Just Experienced a Cyber-Attack!

My Business Just Experienced a Cyber-Attack!

Health and Human Services, Office for Civil Rights (HHS OCR) released a cybersecurity checklist and infographic in ...
5 Common HIPAA Mistakes

5 Common HIPAA Mistakes

Now more than ever, HIPAA compliance is a must. It’s hard to believe, but HIPAA violations can soar to over ...
HIPAA Compliance Will Stop Ransomware’s Damage

HIPAA Compliance Will Stop Ransomware’s Damage

On average, there have been 4,000 daily ransomware attacks since early 2016, an increase of 300% from the 1,000 ...
WannaCry Ransomware Protection with HIPAA

WannaCry Ransomware Protection with HIPAA

WannaCry, WannaCrypt, Wana Decryptor or WCry, whatever it is called, ransomware has been spreading through over ...
Creating and Managing Passwords

Creating and Managing Passwords

How many times a day do you access applications or websites that require passwords? The temptation is to make ...
Malicious Social Engineering and HIPAA

Malicious Social Engineering and HIPAA

Spam accounts for 65% of the total volume of global internet email traffic according to Cisco’s 2017 Annual ...
HIPAA Violations Every Day and Every Size

HIPAA Violations Every Day and Every Size

We frequently get questions about whether or not an event is a HIPAA violation. Some of the events are hazy, ...
HIPAA and Medical Records Retention Requirements by State

HIPAA and Medical Records Retention Requirements by State

The Health Insurance Portability and Accountability Act (HIPAA) requires Covered Entities and Business Associates ...
Auditing Business Associates

Auditing Business Associates

Have you Audited your HIPAA Business Associates? This question comes up frequently when we are working on HIPAA ...
Implementing HIPAA is More Than Meeting Government Regulations

Implementing HIPAA is More Than Meeting Government Regulations

Recently, I was on a vacation in Germany, and as I visited several medieval cities, I had two thoughts. First, ...
The FTC Act and HIPAA Protect the Same Information

The FTC Act and HIPAA Protect the Same Information

You collect Personally Identifiable Information (PII) about your patients, employees and clients, which can be ...
Microsoft End of Support for 2017

Microsoft End of Support for 2017

Note: We update this list every year. To see the most recent version of this post, click here. There are numerous ...
It’s Time to Report Small Breaches

It’s Time to Report Small Breaches

Deadline for Reporting HIPAA Breaches Affecting Fewer than 500 Individuals ­­– February 28, 2017   HIPAA breaches ...
Are You Prepared for Ransomware?

Are You Prepared for Ransomware?

Both large and small businesses are warned about hackers getting into their files and demanding a ransom in order ...
HIPAA and Cloud Computing Part II

HIPAA and Cloud Computing Part II

Health and Human Services (HHS), Office of Civil Rights’ (OCR) Phase 2 of the HIPAA Audit Program is scheduled to ...
Encrypting Devices

Encrypting Devices

Most electronic devices come with the ability to encrypt the internal drive. Encrypting your data adds an extra ...
HIPAA Compliant Email Encryption Review

HIPAA Compliant Email Encryption Review

Covered Entities, Business Associates and Business Associate Subcontractors are required to protect the PHI they ...

Take control of your compliance.

Man
Save & Share Cart
Your Shopping Cart will be saved and you'll be given a link. You, or anyone with the link, can use it to retrieve your Cart at any time.
Back Save & Share Cart
Your Shopping Cart will be saved with Product pictures and information, and Cart Totals. Then send it to yourself, or a friend, with a link to retrieve it at any time.
Your cart email sent successfully :)

[el.selectedIndex]
[el.selectedIndex]
[fieldObj.selectedIndex]
[fieldObj.selectedIndex]
[el.selectedIndex]
[el.selectedIndex]
[fieldObj.selectedIndex]
[fieldObj.selectedIndex]
[el.selectedIndex]
[el.selectedIndex]
[fieldObj.selectedIndex]
[fieldObj.selectedIndex]