
Sign up to save your podcasts
Or


When physicians contemplate HIPAA compliance and the safeguarding of patients' protected health information (PHI), their primary focus typically centers on internal aspects. Questions such as, "Do our practice's written policies align with HIPAA requirements? Have we adequately trained our employees on HIPAA regulations? Is our computer infrastructure and software adequately secure?" often dominate their concerns. However, one crucial aspect that often goes unaddressed is whether the vendors who have access to our patients' PHI are also diligently taking steps to ensure the protection of this sensitive information.
In this episode, we engage in a discussion with Christine Schneider, Vice President of Operations, and Jon Kettner, who oversees HIPAA compliance at RevCycle Partners. They provide insights into the comprehensive process RevCycle Partners follows to achieve HIPAA compliance and offer guidance on the essential inquiries you should be making of your vendors to fortify your defenses against potential data breaches.
By IDOC5
1818 ratings
When physicians contemplate HIPAA compliance and the safeguarding of patients' protected health information (PHI), their primary focus typically centers on internal aspects. Questions such as, "Do our practice's written policies align with HIPAA requirements? Have we adequately trained our employees on HIPAA regulations? Is our computer infrastructure and software adequately secure?" often dominate their concerns. However, one crucial aspect that often goes unaddressed is whether the vendors who have access to our patients' PHI are also diligently taking steps to ensure the protection of this sensitive information.
In this episode, we engage in a discussion with Christine Schneider, Vice President of Operations, and Jon Kettner, who oversees HIPAA compliance at RevCycle Partners. They provide insights into the comprehensive process RevCycle Partners follows to achieve HIPAA compliance and offer guidance on the essential inquiries you should be making of your vendors to fortify your defenses against potential data breaches.

75 Listeners

102 Listeners

80 Listeners

15 Listeners

29,274 Listeners

13 Listeners

21 Listeners

20,321 Listeners

14 Listeners

0 Listeners

1,480 Listeners

10 Listeners

8,475 Listeners

1,499 Listeners

6 Listeners