
Sign up to save your podcasts
Or


When physicians contemplate HIPAA compliance and the safeguarding of patients' protected health information (PHI), their primary focus typically centers on internal aspects. Questions such as, "Do our practice's written policies align with HIPAA requirements? Have we adequately trained our employees on HIPAA regulations? Is our computer infrastructure and software adequately secure?" often dominate their concerns. However, one crucial aspect that often goes unaddressed is whether the vendors who have access to our patients' PHI are also diligently taking steps to ensure the protection of this sensitive information.
In this episode, we engage in a discussion with Christine Schneider, Vice President of Operations, and Jon Kettner, who oversees HIPAA compliance at RevCycle Partners. They provide insights into the comprehensive process RevCycle Partners follows to achieve HIPAA compliance and offer guidance on the essential inquiries you should be making of your vendors to fortify your defenses against potential data breaches.
By IDOC5
1717 ratings
When physicians contemplate HIPAA compliance and the safeguarding of patients' protected health information (PHI), their primary focus typically centers on internal aspects. Questions such as, "Do our practice's written policies align with HIPAA requirements? Have we adequately trained our employees on HIPAA regulations? Is our computer infrastructure and software adequately secure?" often dominate their concerns. However, one crucial aspect that often goes unaddressed is whether the vendors who have access to our patients' PHI are also diligently taking steps to ensure the protection of this sensitive information.
In this episode, we engage in a discussion with Christine Schneider, Vice President of Operations, and Jon Kettner, who oversees HIPAA compliance at RevCycle Partners. They provide insights into the comprehensive process RevCycle Partners follows to achieve HIPAA compliance and offer guidance on the essential inquiries you should be making of your vendors to fortify your defenses against potential data breaches.

517 Listeners

76 Listeners

573 Listeners

102 Listeners

80 Listeners

15 Listeners

19 Listeners

20 Listeners

1,432 Listeners

21 Listeners

14 Listeners

14 Listeners

8,398 Listeners

13 Listeners

5 Listeners