
Sign up to save your podcasts
Or
When physicians contemplate HIPAA compliance and the safeguarding of patients' protected health information (PHI), their primary focus typically centers on internal aspects. Questions such as, "Do our practice's written policies align with HIPAA requirements? Have we adequately trained our employees on HIPAA regulations? Is our computer infrastructure and software adequately secure?" often dominate their concerns. However, one crucial aspect that often goes unaddressed is whether the vendors who have access to our patients' PHI are also diligently taking steps to ensure the protection of this sensitive information.
In this episode, we engage in a discussion with Christine Schneider, Vice President of Operations, and Jon Kettner, who oversees HIPAA compliance at RevCycle Partners. They provide insights into the comprehensive process RevCycle Partners follows to achieve HIPAA compliance and offer guidance on the essential inquiries you should be making of your vendors to fortify your defenses against potential data breaches.
5
1111 ratings
When physicians contemplate HIPAA compliance and the safeguarding of patients' protected health information (PHI), their primary focus typically centers on internal aspects. Questions such as, "Do our practice's written policies align with HIPAA requirements? Have we adequately trained our employees on HIPAA regulations? Is our computer infrastructure and software adequately secure?" often dominate their concerns. However, one crucial aspect that often goes unaddressed is whether the vendors who have access to our patients' PHI are also diligently taking steps to ensure the protection of this sensitive information.
In this episode, we engage in a discussion with Christine Schneider, Vice President of Operations, and Jon Kettner, who oversees HIPAA compliance at RevCycle Partners. They provide insights into the comprehensive process RevCycle Partners follows to achieve HIPAA compliance and offer guidance on the essential inquiries you should be making of your vendors to fortify your defenses against potential data breaches.
75 Listeners
55 Listeners
324 Listeners
63 Listeners
11 Listeners
77 Listeners
100 Listeners
14 Listeners
19 Listeners
17 Listeners
11 Listeners
19 Listeners
3,295 Listeners
11 Listeners
13 Listeners