Security as Part of the M & A Due Diligence Process

Technical and financial due diligence have long been a part of the review performed by an acquiring company prior to a merger or acquisition (M & A). Cyber security has finally become an important business concern, and this requires information […]

LoadingAdd to favorites

HHS Issues Ransomware Guidance

HHS issued Ransomware guidance recently that clarified that a ransomware attack involving ePHI (electronic Protected Health Information) is a HIPAA breach unless the Covered Entity of Business Associate can demonstrate that there is a low probability that the PHI has been compromised. Ransomware is a […]

LoadingAdd to favorites

OCR Crosswalk Between NIST Cybersecurity Framework and the HIPAA Security Rule

Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity was issued by President Obama in 2013, and called for the development of a voluntary risk-based cybersecurity framework (CSF) that is “prioritized, flexible, repeatable, performance-based, and cost-effective.” In response, the National Institute of Standards […]

LoadingAdd to favorites

Business Associate –What Are Your Obligations?

If your company creates, receives, maintains or transmits Personal Health Information (PHI) on behalf of a Covered Entity and is not a member of the Workforce of the Covered Entity, or is a company that provides accounting, legal, processing or administration, data analysis […]

LoadingAdd to favorites