New ebook Available: Get Hip to HIPAA: A Beginner’s Guide to HIPAA Compliance

HIPAA ebook is available

Struggling to understand the basics to HIPAA compliance? Want to keep your customers’ private data safe? Download Anderson Technologies’ Get Hip to HIPAA: A Beginner’s Guide to HIPAA Compliance for an overview of the important aspects of HIPAA, including the Security Rule, Risk Assessments, and the many resources available to help bring you into compliance. […]

HIPAA Part 7: Getting Started

It is time to get started on the path to HIPAA compliance

We’ve come to the end of our HIPAA series, and if you’ve been following along, you might feel overwhelmed by the prospect of becoming HIPAA compliant. There’s a lot to do if you’re just starting out. Keep in mind that by creating a culture of compliance, it becomes easier to verify that you’re following the […]

HIPAA Part 6: Plan for the Worst

HIPAA guidelines help you to plan for the worst

No one likes to think they’ll suffer a disaster, a ransomware attack, or a data breach, but hope isn’t enough to satisfy HIPAA. The question is no longer if something will happen, but when. HIPAA expects you to plan, prepare, test, and be ready for anything that could disrupt the confidentiality, integrity, or availability of […]

HIPAA Part 5: The Cycle of Risk

You can stop the cycle of risk!

In part 4 of our HIPAA series, we dug deep into the Security Risk Analysis (SRA) and how to perform one. This time, we’re going to look at what to do with the SRA once it’s completed. The SRA serves as a starting point for fulfilling many of the standards of the Security Rule, but […]

HIPAA Part 4: Risky Business

How do we assess risk in business? HIPAA gives some guidelines.

No matter the size of your practice, compliance with the HIPAA Security Rule is a serious undertaking. In order to fix a problem, you must first know it exists. That’s why the Risk Analysis and Risk Management implementation specifications are the foundation of your security compliance efforts. We touched on risk management in Part 2 […]

HIPAA Part 3: Document! Document! Document!

hipaa documentation

As you read through the Privacy and Security Rules for HIPAA, you’ll see a pattern that shouldn’t be taken for granted. Nearly all the implementation specifications require some form of policy and procedure documentation. This involves more than the reasoning and justification for how you choose to implement the specifications (though that must be documented […]

HIPAA Part 2: Diving Deep into the Security Rule

Dive deep into the HIPAA Security Rule

In our first HIPAA article, we offered a little history on the Health Insurance Portability and Accountability Act and a general overview of how the Privacy and Security Rules evolved from it. In this post, we’re going deep into the murky depths of the Security Rule from a business standpoint. HIPAA’s Security Rule may seem […]

Get Hip to HIPAA!

Is your business HIPAA compliant?

Even if you’ve never worked in the healthcare industry, you’ve probably heard of HIPAA. An appointment to get your teeth cleaned comes complete with a slew of forms that include your rights according to HIPAA. But can you explain what HIPAA is and why that form is necessary? We often sign and date and move […]