<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>CompassDB Archives - Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/category/compassdb/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/category/compassdb/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Thu, 27 Jun 2019 02:07:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>CompassDB Archives - Third Rock</title>
	<link>https://thirdrock.com/blog/category/compassdb/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>HHS OCR: PHI Security is your top priority</title>
		<link>https://thirdrock.com/blog/2017/05/11/hhs-ocr-phi-security-is-your-top-priority/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 11 May 2017 14:00:11 +0000</pubDate>
				<category><![CDATA[CompassDB]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[Risk Management Plan]]></category>
		<category><![CDATA[security risk analysis]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=3590</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/05/11/hhs-ocr-phi-security-is-your-top-priority/">HHS OCR: PHI Security is your top priority</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="wp-image-1377 alignleft" style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/cyber_security_200x.jpg?resize=188%2C141&#038;ssl=1" alt="" width="188" height="141" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/cyber_security_200x.jpg?resize=300%2C225&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/cyber_security_200x.jpg?w=533&amp;ssl=1 533w" sizes="(max-width: 188px) 100vw, 188px" />If you haven&#8217;t noticed, <em><strong>cybersecurity</strong></em> is a major issue in the world, politically, economically, and even personally.  No one wants their identity stolen.  No business wants to deal with customer (patient) retaliation caused from losing their personal health information, whether it&#8217;s boycotting, bad press, negative social media or a class action lawsuit.</p>
<p>In general the U.S. government is taking action to help protect small businesses by requesting a new standard cybersecurity guide be written by the National Institute of Technology.  More specifically for the healthcare industry, the Health and Human Services Office of Civil Rights is now checking to make sure all covered entities are taking steps to improve cybersecurity to protect PHI.  The HHS OCR now requires that covered entities and business associates can show they have a <em>risk management plan</em> in place and are correcting issues found in the <em>security risk analysis</em> (risk assessment).</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-3623 size-thumbnail" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/cartoon-image-of-doctor-with-checklist-150x150.jpg?resize=150%2C150&#038;ssl=1" alt="" width="150" height="150" /></p>
<p>If you&#8217;re a healthcare provider you might ask, &#8220;How do I secure PHI?&#8221;  I actually wrote a <a href="http://thirdrock.com/blog/2017/04/25/cyber-security-have-you-hardened-your-systems/">blog</a> about this recently.  Check out that <a href="http://thirdrock.com/blog/2017/04/25/cyber-security-have-you-hardened-your-systems/">blog</a> for starters.  If you have not performed a Security Risk Analysis you should do that <em>first</em>. That should give you a <em>prioritized list</em> of issues you must address.  <em>The <strong>top priority</strong> should be <strong>cybersecurity</strong>.</em></p>
<p>We strongly suggest you use a next generation compliance management tool, like <a href="https://www.compassdb.io/">CyberCompass</a>, to manage your HIPAA compliance.  It makes HIPAA compliance simple, easy, and affordable.</p>
<p>Take action, Protect Your Patients, Protect Your Practice, Protect Yourself.</p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/05/11/hhs-ocr-phi-security-is-your-top-priority/">HHS OCR: PHI Security is your top priority</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3590</post-id>	</item>
		<item>
		<title>Third Rock is seeking HIPAA partners and consultants</title>
		<link>https://thirdrock.com/blog/2017/01/31/third-rock-is-seeking-hipaa-partners-and-consultants/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Tue, 31 Jan 2017 14:34:39 +0000</pubDate>
				<category><![CDATA[CompassDB]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Partners]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[Consultant]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Worry-Free Compliance]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2921</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/01/31/third-rock-is-seeking-hipaa-partners-and-consultants/">Third Rock is seeking HIPAA partners and consultants</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><a href="https://i0.wp.com/thirdrock.com/wp-content/uploads/p201350_s.jpg?ssl=1"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-2922 size-medium" style="margin-bottom: 5px; margin-left: 5px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/p201350_s.jpg?resize=300%2C200&#038;ssl=1" width="300" height="200" scale="0" /></a>Third Rock is seeking HIPAA partners and consultants! If you are a HIPAA guru like us, working to help physicians, covered entities, and business associates complete their HIPAA requirements in a simple and worry-free manner, we would love to talk with you! Our CompassDB platform combines annual security risk analysis (SRA), remediation tracking and guidance, customized policies and procedures, BA Management, training logs and other HIPAA necessities in one easy-to-use portal for each of your customers.</p>
<p>Because of the ease in automation, it allows you to provide better and faster results and remediation guidance to your customer base more rapidly and accurately. CompassDB™ is saving people like you up to 70% in time for back end reporting and managing it all in one place. Plus, you provide your clients with the required electronic book of evidence for OCR. You can white label the tool with brand, so you look like a current, professional, consulting firm.</p>
<p>If this sounds like you and you want to save time, grow your business and help customers, we want to hear from you! Check out our website at <a href="http://thirdrock.com">www.thirdrock.com</a> and <a href="http://www.compassdb.io">www.compassdb.io</a> for information.</p>
<p>If interested you can either contact Brian Davis, personally at <a href="mailto:brian.davis@thirdrock.com">brian.davis@thirdrock.com</a> or use the form below.</p>
<p>There is a way to really make compliance Worry-Free!</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/01/31/third-rock-is-seeking-hipaa-partners-and-consultants/">Third Rock is seeking HIPAA partners and consultants</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2921</post-id>	</item>
		<item>
		<title>From Meaningful Use to MACRA &#8211; Security Risk Analysis is still first requirement</title>
		<link>https://thirdrock.com/blog/2016/11/22/from-meaningful-use-to-macra-security-risk-analysis-is-still-first-requirement/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Tue, 22 Nov 2016 15:00:53 +0000</pubDate>
				<category><![CDATA[CompassDB]]></category>
		<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[ACI]]></category>
		<category><![CDATA[Body of Evidence]]></category>
		<category><![CDATA[compliance management tool]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[MACRA]]></category>
		<category><![CDATA[Meaningful Use]]></category>
		<category><![CDATA[MIPS]]></category>
		<category><![CDATA[risk assessment]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2528</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2016/11/22/from-meaningful-use-to-macra-security-risk-analysis-is-still-first-requirement/">From Meaningful Use to MACRA &#8211; Security Risk Analysis is still first requirement</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><div>
<p>The Department of Health and Human Services (HHS) issued its final rule implementing the Quality Payment Program (QPP) that is part of the Medicare Access and CHIP Reauthorization Act (MACRA).  The QPP will reform Medicare payments for more than 600,000 clinicians across the country, and is a major step in improving care across the entire health care delivery system.  As a provider you can choose how you want to participate in the QPP based on your practice size, specialty, location, or patient population.  The QPP has two tracks you can choose from: Advanced Alternative Payment Models (APMs) or The Merit-based Incentive Payment System (MIPS). MIPS replaces the existing Meaningful Use (MU), Physician Quality Reporting System (PQRS), and Value-Based Modifier (VBM).  Within MIPS the Advancing Care Information (ACI) replaces <strong>Meaningful Use</strong>, also known as the Medicare EHR Incentive Program.</p>
</div>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-2586" style="margin-right: 12px; margin-bottom: 8px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/White-Risk-Assessment-on-blue-return-key-on-keyboard.jpg?resize=175%2C116&#038;ssl=1" alt="Risk Assessment on PC Keyboard Background. Blue Risk Assessment Keypad on Keyboard. Risk Assessment Close Up of Computer Keyboard on a Modern Laptop. 3D Illustration." width="175" height="116" /></p>
<p>As you know, <strong>Meaningful Use required a Security Risk Analysis (SRA)</strong>.  It&#8217;s also important for you to know that <strong>MACRA lists the Security Risk Analysis as the first requirement to qualify and receive payments</strong>. Meaningful Use helped many providers learn about the Security Risk Analysis and MACRA continues that requirement.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-1663 size-medium" style="margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/audit-on-red-3D-puzzle-pieces-c972865_s.jpg?resize=300%2C157&#038;ssl=1" alt="Audit - White Word on Red Puzzles on White Background. 3D Illustration." width="300" height="157" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/audit-on-red-3D-puzzle-pieces-c972865_s.jpg?resize=300%2C157&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/audit-on-red-3D-puzzle-pieces-c972865_s.jpg?w=382&amp;ssl=1 382w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>It&#8217;s very important to realize <strong>the SRA is the beginning step to becoming HIPAA Compliant</strong>.  The word on the street is that the Office of Civil Rights (OCR) plans to audit every provider within three years.  With an audit looming, it&#8217;s important to realize the OCR is also requiring that you have a body of evidence that shows you have been performing SRAs or Risk Assessments (Privacy and Security Risk Analysis) for several years.  You must also provide your body of evidence in electronic format.  With those requirements, it&#8217;s very important to use a compliance management tool to guide your through the HIPAA compliance process, to log everything involved and to generate a report for auditors in electronic format.</p>
<p>CompassDB is a compliance management tool that will save you time, effort, and money and is very affordable. For more information check out <a href="https://www.compassdb.io/">CompassDB</a>.</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2016/11/22/from-meaningful-use-to-macra-security-risk-analysis-is-still-first-requirement/">From Meaningful Use to MACRA &#8211; Security Risk Analysis is still first requirement</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2528</post-id>	</item>
		<item>
		<title>Value Proposition of a Next-Generation Compliance Platform (2 of 2)</title>
		<link>https://thirdrock.com/blog/2016/10/27/value-proposition-of-a-next-generation-compliance-platform-2-of-2/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 27 Oct 2016 14:00:51 +0000</pubDate>
				<category><![CDATA[CompassDB]]></category>
		<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[Body of Evidence]]></category>
		<category><![CDATA[business operations]]></category>
		<category><![CDATA[culture of compliance]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[next-generation management platform]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[value proposition]]></category>
		<category><![CDATA[Worry-Free Compliance]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2323</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2016/10/27/value-proposition-of-a-next-generation-compliance-platform-2-of-2/">Value Proposition of a Next-Generation Compliance Platform (2 of 2)</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-2533 " style="margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Next-Generation.jpg?resize=120%2C90&#038;ssl=1" alt="Next Generation Concept - Golden Color Text on Dark Blue Digital Background." width="120" height="90" /></p>
<p>This is the second in a two part series concerning the value of compliance.  Our mission is, Worry-Free Compliance, to help you obtain a <em><strong>culture of compliance</strong></em> through normal business operations.  Our vision is to reduce the complexity, cost and burden of HIPAA compliance using a next-generation compliance management platform.</p>
<p>What does a next-generation management platform provide?  Here&#8217;s a list:</p>
<ul style="padding-left: 1em;">
<li style="list-style-type: none;">
<ul style="padding-left: 1em;">
<li style="text-indent: -1em;"><b>Complete</b>
<ul style="padding-left: 1em;">
<li style="text-indent: -1em;">Manages the entire compliance process</li>
<li style="text-indent: -1em;">Maintains custom policies and procedures</li>
<li style="text-indent: -1em;">Provides and tracks training</li>
<li style="text-indent: -1em;"><span style="color: #0000ff;"><strong>Creates &amp; maintains Body of Evidence for audits</strong></span></li>
</ul>
</li>
</ul>
</li>
<li style="list-style-type: none;">
<ul style="padding-left: 1em;">
<li style="text-indent: -1em;"><b>Simple and Easy</b>
<ul style="padding-left: 1em;">
<li style="text-indent: -1em;">Understandable format, HIPAA expertise not required</li>
<li style="text-indent: -1em;">Logic driven questions reduces assessment time</li>
<li style="text-indent: -1em;">Supporting documentation easily attached and managed</li>
<li style="text-indent: -1em;"><strong><span style="color: #0000ff;">Generates electronic reports for audits</span></strong></li>
</ul>
</li>
</ul>
</li>
<li style="list-style-type: none;">
<ul style="padding-left: 1em;">
<li style="text-indent: -1em;"><b>Significantly Reduces Time and Effort</b>
<ul style="padding-left: 1em;">
<li style="text-indent: -1em;">Intuitive, step-by-step workflow</li>
<li style="text-indent: -1em;">Provides remediation guidance and support</li>
<li style="text-indent: -1em;">Automates building the body of evidence</li>
<li style="text-indent: -1em;">Reduces man-hours by over 50%</li>
<li style="text-indent: -1em;"><strong><span style="color: #0000ff;">Reduces overall cost of HIPAA compliance by 65%</span></strong></li>
</ul>
</li>
</ul>
</li>
<li style="list-style-type: none;">
<ul style="padding-left: 1em;">
<li style="text-indent: -1em;"><b>Greatly reduces liabilities</b></li>
</ul>
</li>
</ul>
<p>Before you buy a HIPAA kit that will sit on your shelves and collect dust or hire a HIPAA auditor/consultant to perform a security risk analysis for you, then leaves you a checklist of issues to correct, you should consider using an online tool that makes you more compliant, in less time and helps you maintain your culture of compliance.</p>
<p>The first post in this two-part series was <a href="http://thirdrock.com/blog/2016/10/13/value-proposition-of-hipaa-compliance-1-of-2/"><em>Value Proposition of HIPAA Compliance</em></a>.</p>
<p>Take our <a href="https://cyberquickcheck.com/">free mini-Risk Assessment</a> to see how compliant you are.</p>
<p><span style="color: #0000ff;">Protect your patients, protect your practice, protect yourself.</span></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2016/10/27/value-proposition-of-a-next-generation-compliance-platform-2-of-2/">Value Proposition of a Next-Generation Compliance Platform (2 of 2)</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2323</post-id>	</item>
		<item>
		<title>Protect your patients, protect your practice, protect yourself.</title>
		<link>https://thirdrock.com/blog/2016/09/29/protect-your-patients-protect-your-practice-protect-yourself/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 29 Sep 2016 14:00:10 +0000</pubDate>
				<category><![CDATA[CompassDB]]></category>
		<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber-crime]]></category>
		<category><![CDATA[cyber-theft]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HIPAA fines]]></category>
		<category><![CDATA[HITECH]]></category>
		<category><![CDATA[PHI]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2288</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2016/09/29/protect-your-patients-protect-your-practice-protect-yourself/">Protect your patients, protect your practice, protect yourself.</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-1668" style="margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Audit-on-blue-puzzle-in-magnifier-c903339_s.jpg?resize=64%2C85&#038;ssl=1" alt="Audit through Lens on Missing Puzzle Peace. Selective Focus. 3D Render." width="64" height="85" scale="0" /></p>
<p>The healthcare industry is beginning to realize that HIPAA is here to stay and they are probably going to be audited sooner or later.  What physicians and all healthcare providers need to understand is that if you don&#8217;t protect your patients&#8217; PHI/ePHI the following can happen to your patients as a result of their identity being stolen and used.</p>
<h4>NOT Protecting Your Patients&#8217; (PHI/ePHI):</h4>
<ol>
<li>You can cause them financial difficulties or even financial ruin.</li>
<li>You can cause them undue stress, even a stroke or heart attack.</li>
<li>You can cause them to be denied healthcare insurance.</li>
<li>You can cause them to be denied healthcare services.</li>
<li>You can cause them to be denied medicines, treatments, and therapies.</li>
<li>You can cause them to be misidentified during healthcare treatment, causing incorrect operations, procedures, medicines, or even death.</li>
<li>You can cause the death of your patient.</li>
<li>You will suffer the consequences listed under &#8220;NOT Protecting Your Practice&#8221;.</li>
</ol>
<p>You might think, these can&#8217;t happen, but all of them have already happened, with the exception of causing a death, but there have been several close calls with death because of identity theft.</p>
<p>What HIPAA &#8220;forces&#8221; you to do, is what you should already be doing:  operating a safe, secure, efficient, productive, and profitable healthcare provider organization.  That&#8217;s right, if you were doing what needs to be done to protect your patients&#8217; PHI/ePHI, you would be HIPAA compliant and you would be protecting your practice (business) and yourself.</p>
<h4>NOT Protecting Your Practice:</h4>
<ol>
<li>You will likely be breached and lose access to or have your patient&#8217;s ePHI stolen.</li>
<li>You will receive the maximum fine from the HHS OCR audit, which may close your doors.</li>
<li>You will likely have a class action lawsuit by your patients against you.</li>
<li>You will have approximately 40% of your patients abandon you and your services.  (People don&#8217;t like having their identity stolen.)</li>
<li>You will have to pay for the remediation of your HIPAA non-compliance issues with government oversight.</li>
<li>You will have to pay for cyber theft protection insurance for all of your patients.</li>
<li>You will suffer from negative social media.</li>
<li>You will suffer major interruption to your cash flow.</li>
</ol>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-2276" style="margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/behind-bars.jpg?resize=168%2C122&#038;ssl=1" alt="behind-bars" width="168" height="122" scale="0" />And last but not least, you must realize you need to protect yourself.  The HIPAA law provides for the prosecution of individuals who neglect to protect their patients&#8217; PHI/ePHI or those individuals who destroy, lose, or steal a patient&#8217;s PHI/ePHI. If you don&#8217;t want to wear an orange jump suit you might want to consider working on becoming HIPAA compliant.</p>
<h4>NOT Protecting yourself:</h4>
<ol>
<li>You could find yourself sued by patients.</li>
<li>You could find yourself fined for failure to protect PHI.</li>
<li>You could find yourself found guilty of breaking the law.</li>
<li>You could find yourself in federal prison.</li>
</ol>
<h4><strong><span style="color: #0000ff;">Protect your patients, protect your practice, protect yourself.</span></strong></h4>
<p>I would strongly suggest you use a Compliance Management Platform to build the required body of evidence, reduce the work load, increase compliance, simplify electronic reporting and save money while working to become HIPAA compliant.  Check out <a href="http://compassdb.com/">CompassDB</a>™ at <a href="http://compassdb.com/">http://compassdb.com/</a>.</p>
<p>If you want to know where you stand with your HIPAA compliance take the <a href="http://cyberquickcheck.com">free HIPAA Quick-Check</a>.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2016/09/29/protect-your-patients-protect-your-practice-protect-yourself/">Protect your patients, protect your practice, protect yourself.</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2288</post-id>	</item>
	</channel>
</rss>
