Call Us! (800)704-3394 / Contact Us /


Blog Subscribe to our Blog

Safeguarding PHI – It’s Not About Compliance; It’s About Patient Trust

Safeguarding PHI – It’s Not About Compliance; It’s About Patient Trust At Clearwater we hear it all the time. Our healthcare clients tell us their organization’s leaders just don’t “get security”. There seems to be an all too common struggle … Continue reading

Leave a comment Continue Reading →

The SEC Joins Growing Alphabet Soup of Regulators Interested in Policing Data Security

The SEC Joins Growing Alphabet Soup of Regulators Interested in Policing Data Security  And it just got even more crowded in the alphabet soup of data security enforcement. It’s the Securities and Exchange Commission’s turn to be on cybersecurity patrol. … Continue reading

Leave a comment Continue Reading →

One Data Breach Can Wipe Out Revenue Cycle Gains

One Data Breach Can Wipe Out Revenue Cycle Gains As seen at hfma.org: One Data Breach Can Wipe Out Revenue Cycle Gains April 18, 2014 By Bob Chaput   Most revenue cycle management initiatives are designed to provide steady-yet-significant improvements that … Continue reading

Leave a comment Continue Reading →

Court Decision Sets “Binding and Persuasive Precedent” Regarding FTC Authority to Police Data Security Practices

Court Decision Sets “Binding and Persuasive Precedent” Regarding FTC Authority to Police Data Security Practices  The Federal Trade Commission is becoming even more interested in policing and enforcing standards for protecting consumers within the context of health information privacy and … Continue reading

Leave a comment Continue Reading →
risky business

HIPAA Risk Analysis Tip – New HHS Risk Assessment Tool – Much Ado About Nothing

This entry is part 47 of 47 in the series HIPAA Security Risk Analysis Tips

HIPAA Risk Analysis Tip – New HHS Risk Assessment Tool – Much Ado About Nothing When I first heard the news… GREAT! … I was genuinely excited when I heard the HHS finally published the Security Risk Assessment tool on which … Continue reading

Leave a comment Continue Reading →

Third-Party Risk is a Growing HIPAA-HITECH Dilemma for Covered Entities and Their Business Associates

Third-Party Risk is a Growing HIPAA-HITECH Dilemma for Covered Entities and Their Business Associates Majority of Healthcare Organizations Grappling with BA Obligations According to Clearwater Compliance Interactive Blue Ribbon Panel Web Event During Clearwater’s most recent monthly HIPAA-HITECH Blue Ribbon … Continue reading

Leave a comment Continue Reading →

New Study Shows Employees Remain Top Threat to HIPAA-HITECH Compliance

New Study Shows Employees Remain Top Threat to HIPAA-HITECH Compliance According to the Ponemon Institute’s Fourth Annual Benchmark Study on Patient Privacy & Data Security, employee negligence is considered the biggest information security risk. 75% of organizations say employee negligence … Continue reading

Leave a comment Continue Reading →

New Study Estimates Data breaches Cost the Healthcare Industry $5.6 billion Annually

This entry is part 45 of 47 in the series HIPAA Security Risk Analysis Tips

New Study Estimates Data Breaches Cost  the Healthcare Industry $5.6 billion Annually A newly released study from the Ponemon Institute underscores major areas of risk for healthcare organizations when trying to safeguard protected health information and uphold requirements under HIPAA-HITECH … Continue reading

Leave a comment Continue Reading →

Teenage Hackers Aren’t Your Biggest Worry

Teenage Hackers Aren’t Your Biggest Worry by Bob Chaput, Health Management Technology, March 18, 2014 Many healthcare organizations rely primarily on their IT departments to prevent data breaches. C-suite leaders are apt to congratulate themselves if their security systems pass … Continue reading

Leave a comment Continue Reading →

What Is OCR Looking for in Upcoming HIPAA Compliance Audits?

What Is OCR Looking for in Upcoming HIPAA Compliance Audits?  What are the top 3 focus areas for the next round of HIPAA compliance audits? A former staffer from the Office for Civil Rights predicts risk assessment, encryption of end-user devices … Continue reading

Leave a comment Continue Reading →