Guard Support (12)
Need help navigating the Guard? Look to these how to guides to find the answers you're looking for.
(Legacy) Guard Support (13)
Need help navigating the Guard? Look to these how to guides to find the answers you're looking for.
-
(Legacy) Programs
-
(Legacy) The Guards Assessment Process
-
(Legacy) Tips on Answering Assessment Questions
-
(Legacy) Assets
-
(Legacy) The Guards Asset Manager
-
(Legacy) Navigating HIPAA-Compliant Device and Cloud and Application Management
-
(Legacy) Vendors
-
(Legacy) Adding and Managing Vendors
-
(Legacy) Managing Vendor Agreements in The Guard
Compliancy Group HIPAA Resources (8)
Find educational HIPAA articles, infographics, and videos here.
-
What is the HIPAA Privacy Rule?
-
Introduction to HIPAA
-
The Seven Fundamental Elements of an Effective Compliance Program
-
The HIPAA Privacy Rule and Confidentiality of PHI
-
What is PHI? HIPAA Key Definitions: Health Information, Individually Identifiable Health Information, Health Care, Healthcare Provider, Protected Health Information, and Electronic Protected Health Information
-
What are the Differences Between "Policies" and "Procedures"?
-
What is the HIPAA Security Rule?
-
What is a Security Risk Assessment (SRA)?
-
How to Conduct a Security Risk Assessment
-
Download Cybersecurity Practices for Small Healthcare Organizations
-
Introduction to Cybersecurity Practices for Small Healthcare Organizations
-
Cybersecurity Practice #1: E-mail Protection Systems (small)
-
Cybersecurity Practice #1: E-mail Protection Systems (medium/large)
-
Cybersecurity Practice #2: Endpoint Protection Systems (medium/large)
-
Cybersecurity Practice #3: Identity and Access Management (medium/large)
OSHA Compliance (2)
The Occupational Safety and Health Act, or OSHA, is a complicated law. Our compliance process is designed to assist you in your efforts to satisfy OSHA medical and dental office regulations.
Webinars (1)
See past Webinar Recordings on different subjects that have been hosted by Compliancy Group