Healthcare Revenue Cycle Management, ICD-10, Claims Reimbursement, Medicare, Medicaid

HIPAA Compliance Resources

HIPAA Data Security Best Practices

While technical requirements under HIPAA help inform data security best practices, they do not provide detailed prescriptions for covered entities to follow to secure sensitive health data across the continuum of care. Sentara Healthcare Vi... Download white paper

Taking a Proactive Approach to Healthcare Vendor Security

Healthcare providers and vendors struggle with some of the same IT security challenges. Providers need to work with the vendors who are willing to improve their security so that both groups are more secure. When working with vendors around ... View webcast

Expert Advice: How to Stay Off the HIPAA “Wall of Shame”

HIPAA’s “Wall of Shame” lists all breaches that affected at least 500 individuals. In the past two years alone, 394 breaches made the list, almost a half of which was the result of unauthorized access or disclosure. How ca... View webcast

HIPAA Data Security Best Practices

In a healthcare environment increasingly dependent on the sharing of electronic protected health information (PHI), covered entities (CEs) must adopt best practices for safeguarding against unauthorized access to sensitive patient data. As ... View webcast

X

Join 30,000 of your peers and get free access to all webcasts and exclusive content

Sign up for our free newsletter:

Our privacy policy


no, thanks

Continue to site...