Top

K2 Compliance

11 Most Common HIPAA Violations

11 Most Common HIPAA Violations

When HIPAA was enacted on August 21, 1996, it turned the entire healthcare industry on its head. More than 20 years later, and many healthcare organizations constantly struggle when attempting to stay on top of everything this government regulation entails. So what are some of the most common HIPAA violations?

K2 Compliance is Proficient with Vendor Management

K2 Compliance is Proficient with Vendor Management

K2 Compliance eliminates the challenges associated with managing an organization’s vendor relationships.

Each vendor has their own unique record within K2 Compliance. These vendor records contain detailed information such as address, website, industry, specific persons of contact, and other demographics. The versatility of the application allows these data points to vary based on client preference

How K2 Compliance Completes a Risk Assessment

How K2 Compliance Completes a Risk Assessment

K2 Compliance is an innovative medium that has redefined the management of the risk assessment process.  The application acts as a central hub to store, collect and analyze data relative to an organization’s security risks.  Let’s take a quick look at the an asset-based risk assessment process managed through K2 Compliance starting with an organization’s hardware.

Policy Management Essentials: An Interview with IntraVires - Part 1

Policy Management Essentials: An Interview with IntraVires - Part 1

If you've ever dealt within the policy management space, you quickly learn how complex it can become. There are many factors to evaluate including; establishing a guiding policy, appointing the proper policy team and coordinator, adopting a charter, and setting expectations and achievable goals. 

We sat down with the legal professionals from IntraVires Healthcare Compliance Consultants to help give organization's a better idea on how to get their policy management process off the ground and keep it running as steadily as possible.

How to Manage The Risk Management Cycle

How to Manage The Risk Management Cycle

Why complicate a process more than it already is? Why not keep in simple?

For instance, take controlling the risk management cycle for your organization. First you have risks to your organization and its assets, so you implement security controls to then mitigate those risks. But you also need to assess and monitor both those risks, and the current implemented security controls.