
Sign up to save your podcasts
Or
When physicians contemplate HIPAA compliance and the safeguarding of patients' protected health information (PHI), their primary focus typically centers on internal aspects. Questions such as, "Do our practice's written policies align with HIPAA requirements? Have we adequately trained our employees on HIPAA regulations? Is our computer infrastructure and software adequately secure?" often dominate their concerns. However, one crucial aspect that often goes unaddressed is whether the vendors who have access to our patients' PHI are also diligently taking steps to ensure the protection of this sensitive information.
In this episode, we engage in a discussion with Christine Schneider, Vice President of Operations, and Jon Kettner, who oversees HIPAA compliance at RevCycle Partners. They provide insights into the comprehensive process RevCycle Partners follows to achieve HIPAA compliance and offer guidance on the essential inquiries you should be making of your vendors to fortify your defenses against potential data breaches.
5
1717 ratings
When physicians contemplate HIPAA compliance and the safeguarding of patients' protected health information (PHI), their primary focus typically centers on internal aspects. Questions such as, "Do our practice's written policies align with HIPAA requirements? Have we adequately trained our employees on HIPAA regulations? Is our computer infrastructure and software adequately secure?" often dominate their concerns. However, one crucial aspect that often goes unaddressed is whether the vendors who have access to our patients' PHI are also diligently taking steps to ensure the protection of this sensitive information.
In this episode, we engage in a discussion with Christine Schneider, Vice President of Operations, and Jon Kettner, who oversees HIPAA compliance at RevCycle Partners. They provide insights into the comprehensive process RevCycle Partners follows to achieve HIPAA compliance and offer guidance on the essential inquiries you should be making of your vendors to fortify your defenses against potential data breaches.
524 Listeners
77 Listeners
569 Listeners
101 Listeners
81 Listeners
15 Listeners
19 Listeners
20 Listeners
1,433 Listeners
21 Listeners
14 Listeners
13 Listeners
8,372 Listeners
13 Listeners
5 Listeners