Looking for a Business Associate Agreement? Download our FREE starter template.
Total HIPAA Logo

Top 10 Total HIPAA Blog Posts of 2022

Throughout 2022, Total HIPAA has focused on providing information that will keep your organization HIPAA compliant and secure by blogging on relevant topics that matter. This is our last blog of 2022. It includes a list of our most visited and cited blogs this year.

Total HIPAA aims to be your trusted source for information on cybersecurity, HIPAA implementation, other regulatory frameworks, and any other topics our readers need to know about. From blogs about basic HIPAA requirements to reviews of efax vendors, we’ve got you covered! Total HIPAA strives to be your one-stop HIPAA shop.

Based on your clicks, here are Total HIPAA’s Top 10 Blogs of 2022.

10. GDPR and HIPAA Compliance – Do They Overlap?

GDPR, or General Data Protection Regulation, has sent companies big and small scrambling since it went into effect May 25, 2018.1 While the majority of companies affected are within the EU (European Union), some U.S. organizations must comply with GDPR rules, too. How does another country’s data protection regulation play a role in the United States? This week, we’ll explore what GDPR is, followed by what you need to know about it in terms of a HIPAA Covered Entity or Business Associate. Read More

9. HIPAA Sanction Policies: What Employees and Employers Need to Know

When it comes to HIPAA law, the sanction policy is one of the most important factors employees must be aware of. HIPAA does not mandate exactly how employers must discipline their employees in the workplace. So, we provide our suggested guidelines for HIPAA sanction policies. Read More

8. Notice of Privacy Practices (NPP) – Most People’s Connection to HIPAA

When you mention HIPAA, most people reference the Notice of Privacy Practices (NPP) they received at the hospital, doctor’s, dentist’s or eye doctor’s office. The NPP is a document that tells your patients, employees, or clients how their health information may be used and shared and lists their health privacy rights related to Protected Health Information (PHI). Read More

File sharing is a critical tool used by businesses and healthcare providers to easily share, control, and protect important files stored in the cloud. These applications are indispensable to businesses and individuals that require more space to store their files and the desire of adding flexibility to access information anywhere. Read More

6. Meeting HIPAA Requirements When Working Remotely

While there are several advantages of working remotely, there’s a monstrous risk for those that are obligated to comply with HIPAA: keeping clients’ protected health information (PHI) safe. Not convinced it’s a big deal? HHS levies hefty financial penalties when entities fail to properly manage their telecommuters’ access and protection of PHI. Read More

5. HIPAA Compliant efax Provider Recommendations

Many HIPAA compliant organizations need to send and receive electronic Protected Health Information (ePHI) on a regular basis. HIPAA requires you to secure information at rest, in transit, and in storage. If you fax PHI, you must ensure the safety of this sensitive information in transit. HIPAA compliant efax services are an ideal replacement for traditional fax machines many businesses are phasing out. Read More

4. Is Gmail HIPAA Compliant Email? – Well, It Can Be!

Andrew Kroninger, Total HIPAA’s Director of Customer Success, recently interviewed Gil Vidal, founder and CEO of VM Racks, a HIPAA compliant cloud managing solution. The two discussed Gmail’s potential for HIPAA compliant email messaging. You can listen to this episode of our podcast HIPAA Talk! here or on your mobile device via Apple Podcasts. Or, read our summary. Read More

3. HIPAA Compliant Text Messaging Apps – BEST OPTIONS

Today, everyone uses text messaging (“texting”) for easy and quick communication. It is a great tool for convenience and efficiency, but most users don’t realize that texting is an unencrypted form of communication. Text messages can be intercepted at any point in transmission. In this blog we will review several companies that provides HIPAA compliant text messaging, allowing secure texting of PHI. Read More

2. Best HIPAA Compliant Email Encryption Services

In this blog post, we review nine email encryption vendors (Barracuda, Egress, Hushmail, Indentillect, MailHippo, LuxSci, Protected Trust, Rmail, & Virtru) who provide HIPAA compliant email encryption services that will keep your information safe when in transit. Read More

1. Business Associate Agreement: Everything Explained

The HIPAA Omnibus Rule changed how BAs and Business Associate Subcontractors (BAS) can be held liable for potential HIPAA violations. Therefore, it is in the Covered Entity’s and the BA’s best interest to maintain a thorough understanding of their relationship and how they expect one another to secure patient, client, or employee data. Read More

If you have suggestions on topics you would like us to address in 2023, please let us know. Happy Holidays!

Have you performed a Risk Assessment in the past year? Do you have updated HIPAA Policies and Procedures in place? Our HIPAA Prime™ program does all this and more! We create customized compliance documents and provide your staff with easy online training, ensuring compliance for your business.

Want to know more about how you can become HIPAA compliant?

Email us at info@totalhipaa.com to learn more about how we can help your organization become (and stay!) HIPAA compliant. Or, get started here.

Sharing is caring!


Looking for a Business Associate Agreement?

Download our free template to get started on your path toward HIPAA compliance.

Download Now

Let's keep in touch

Stay up to date on the latest HIPAA news, plus receive tons of free tools and info.

Navigating HIPAA Compliance in 2023

Watch the recording of this webinar to learn more about how you can become and stay HIPAA compliant!


Related Posts

What is Access Control in terms of HIPAA?

What is Access Control in terms of HIPAA?

Access control, in terms of cybersecurity, refers to the practice of managing and regulating who can access specific resources, systems, or data within an organization's network or information...

Comparing HIPAA and NIST

Comparing HIPAA and NIST

In the ever-evolving landscape of data security and privacy, two key frameworks have emerged as significant players: HIPAA and NIST. Both emphasize the importance of safeguarding sensitive...

Save & Share Cart
Your Shopping Cart will be saved and you'll be given a link. You, or anyone with the link, can use it to retrieve your Cart at any time.
Back Save & Share Cart
Your Shopping Cart will be saved with Product pictures and information, and Cart Totals. Then send it to yourself, or a friend, with a link to retrieve it at any time.
Your cart email sent successfully :)