Top

K2 Compliance

Building Towards Successful Policy Management Webinar Series

Building Towards Successful Policy Management Webinar Series

All organizations need well-managed policies and procedures. Your policies and procedures are the first line of defense against risk, and they help your organization run smoothly. Is your policy management process effective? Is it up-to-date? Now is a good time to review your policy management process. We've created a three-part webinar series to help you. 
 

[FREE WEBINAR] Overcoming the Challenges of Conducting a Security Risk Analysis

[FREE WEBINAR] Overcoming the Challenges of Conducting a Security Risk Analysis

According to an InformationWeek survey, 62 percent of providers who already have or are planning to implement electronic health or medical records will spend more than 20 percent of their yearly IT budget spending on HIPAA Security Rule-related projects (including MIPS and Meaningful Use) this year. The majority of that 20% will be spent on conducting an annual Security Risk Analysis, forcing healthcare organizations to spend a lot of time and money. The cost of a Security Risk Analysis may seem unavoidable since the annual obligations for the HIPAA Security Rule are required. However, your organization can save money if the right steps are taken.

Failure to Protect ePHI Costs Millions of Dollars

Failure to Protect ePHI Costs Millions of Dollars

Protecting ePHI or electronic Protected Health Information should be a top priority for your organization or you'll soon face huge fines from government entities. Recently, 21st Century Oncology, Inc. (21CO) agreed to pay $2.3 million to the U.S. Department of Health and Human Services (HHS) Office of Civil Rights (OCR) and adopt a comprehensive corrective action plan to settle potential violations of the Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security Rules. 

Announcing Our Partnership with Info GPS and The ACCESS Program

Announcing Our Partnership with Info GPS and The ACCESS Program

Cyber attacks are increasingly targeting the sensitive health information that is maintained by health care providers. The need for healthcare organizations to evaluate and then deploy an effective health data security plan has never been greater. In fact, conducting a security risk analysis is apart of the HIPAA Security Rule.

The Comprehensive Guide to Different Forms of Malware

The Comprehensive Guide to Different Forms of Malware

To define malware, it is malicious software coded with the intent of causing harm to a user, system, or a network. Although malware is nothing new, the rate at which it continues to evolve into new invisible forms of threats should raise the alarm for many businesses. It's important that your organization's staff understands the threat that malware poses and the difference between each form of malware.

HIPAA Key Dates and Creation Timeline

HIPAA Key Dates and Creation Timeline

Since it was enacted in 1996 by the United States government, The Health Insurance Portability and Accountability Act has enforced strict penalties for organizations who fail to provide data privacy and provisions towards safeguarding medical information. More specifically, it demands that the Department of Human Services and Health in the U.S. (HHS) create regulations that protect both the security and privacy of health information.

The FTC's New Policy Enforcement Statement Updates COPPA Enforcement

The FTC's New Policy Enforcement Statement Updates COPPA Enforcement

The Federal Trade Commission (FTC) issued a policy enforcement statement on October 23rd, 2017 that provides new direction on the application of the Children's Online Privacy Protection Rule ("COPPA"). Specifically, they've updated the collection of audio voice recordings online. COPPA compliance applies to operators of online services that are either directed to children under 13 years of age or know they are collecting personal information from children under the age of 13.

The True Costs of Non-Compliance

The True Costs of Non-Compliance

Maintaining compliance on every facet of your organization isn't easy. It's especially hard for smaller organizations and start-ups who simply don't have enough revenue to be able to afford a compliance officer. However, the costs of being out of compliance can be far greater and bring more lasting consequences for companies. Below we've outlined some of the biggest costs associated with non-compliance.