{"id":12637,"date":"2020-05-20T06:40:55","date_gmt":"2020-05-20T10:40:55","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=12637"},"modified":"2022-06-21T08:06:17","modified_gmt":"2022-06-21T12:06:17","slug":"how-can-companies-initiate-successful-hipaa-compliance","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-can-companies-initiate-successful-hipaa-compliance\/","title":{"rendered":"How Can Companies Initiate Successful HIPAA Compliance?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12639 aligncenter\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/05\/national-cancer-institute-NFvdKIhxYlU-unsplash.jpg\" alt=\"Initiate-HIPAA-Complaince\" width=\"648\" height=\"432\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/05\/national-cancer-institute-NFvdKIhxYlU-unsplash.jpg 648w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/05\/national-cancer-institute-NFvdKIhxYlU-unsplash-600x400.jpg 600w\" sizes=\"(max-width: 648px) 100vw, 648px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">The Health Insurance Portability and Accountability Act (HIPAA) of 1996 Security Rule defines standards to protect the electronic personal health information (PHI) of individuals. All identifiable health information such as lab results, medical bills, health records and histories, and so forth, are examples of PHI if a covered entity is in the picture.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The covered entity may be a healthcare provider, a healthcare clearinghouse, or a health plan. Any of these may create, receive, maintain, or use such health information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While the rule has been law since 1996, companies need to develop a more robust <\/span><a href=\"https:\/\/www.m2sys.com\/blog\/health-care\/7-crucial-steps-healthcare-organizations-need-to-take-to-secure-their-health-it-infrastructure\/\"><span style=\"font-weight: 400;\">IT and compliance<\/span><\/a><span style=\"font-weight: 400;\"> strategy. There&#8217;s been an initiative since 2017 to investigate HIPAA breaches, which affect 500 people or less, more thoroughly.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Small breaches are common at organizations of all sizes, a point that many still fail to realize. But, should your business be HIPAA compliant?<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Does Your Business Need to Be HIPAA Compliant?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">When companies handle PHI or collaborate with those in healthcare, they need <\/span><a href=\"https:\/\/cloudapper.com\/hipaa-ready-compliance-software\/\"><span style=\"font-weight: 400;\">HIPAA compliance<\/span><\/a><span style=\"font-weight: 400;\">. A business should also show that they have adequate protections for PHI, enabling it to handle client data safely and securely.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, HIPAA requirements mostly refer to covered entities. Covered entities include all sorts of healthcare organizations and individuals.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">#1 Healthcare Providers<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Healthcare providers include doctors, pharmacies, psychologists, nursing homes, and other providers. But, these groups become covered if they transmit information electronically for a transaction for which the HHS has a set standard.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">#2 Health Plans<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">This second group covers company health plans, health insurance firms, health maintenance organizations (HMOs), and government programs that foot the healthcare bill, such as Medicaid, Medicare, and military\/veteran initiatives.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">#3 Healthcare Clearinghouses<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">This unique group comprises organizations that process non-standard health information from other entities into a standard form such as data content or standard electronic format. They also carry out reverse operations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The law also permits covered entities to share PHI with <\/span><a href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/guidance\/business-associates\/index.html\"><span style=\"font-weight: 400;\">business associates<\/span><\/a><span style=\"font-weight: 400;\"> if there\u2019s a guiding contract defining how each business associate would handle the data. The contract would also demand the protection of the privacy and security of the specific PHI.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Those businesses will also be responsible for compliance with specific HIPAA provisions.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">HIPAA Auditing and Enforcement<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The Health and Human Services Office of Civil Rights (OCR) is responsible for auditing organizations to ensure they comply with HIPAA. The collection of covered entities&#8217; contact details was the focus of the second phase of the OCR audit program\u2019s second phase.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The OCR collected questionnaires about the operations, size, and type of each covered entity. Maybe the OCR <\/span><a href=\"https:\/\/www.bestessayservicereviews.com\/essay-writing\/academized-com-review\/\"><span style=\"font-weight: 400;\">academized<\/span><\/a><span style=\"font-weight: 400;\"> it, but the information helped create pools of potential organizations to audit, and each auditee was a random selection by the OCR.<\/span><\/p>\n<p><iframe loading=\"lazy\" title=\"HIPAA Compliance Made Simple - HIPAA Ready\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/UbYLwhs03Zg?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<h2><span style=\"font-weight: 400;\">Key HIPAA Requirements<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Covered entities must comply with three main requirements. HIPAA-compliant companies have controls and safeguards that enable them to meet these three requirements:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">The Privacy Rule<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The privacy of PHI is crucial to HIPAA. The privacy rule puts standards in place to protect medical records and other Protected Health Information. It also specifies parameters on the use and disclosure of PHI without requisite patient authorization.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The privacy rule also offers patients the right to review their health records and ask providers to correct details in their PHI.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">The Security Rule<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Businesses that HIPAA covers need security standards to protect ePHI or electronic ePHI. The standards cover all the ePHI the covered entity (and their business\u2019s associates) create, receive, use, or maintain.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The OCR says the security rule needs proper administrative, physical, and technical buffers to guarantee a confidential and secure electronically protected health information. Still, businesses can fail at satisfying this rule.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\">\n<h3><span style=\"font-weight: 400;\">Prompt Notification in the Event of Breach of Unsecured Protected Health Information<\/span><\/h3>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The defenses the security rule demands help organizations to avoid breaches. However, if a HIPAA-compliant organization experiences one, they are to notify specific parties depending on the scope and type of breach. The parties include individuals, the Secretary of breaches of unsecured information, and the media.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A breach refers to a non-permitted use or disclosure under the Privacy Rule that infringes privacy or security of the PHI. Breaches are not just the result of hacking or malware activity, and these two account for <\/span><a href=\"https:\/\/ocrportal.hhs.gov\/ocr\/breach\/breach_report.jsf\"><span style=\"font-weight: 400;\">23 percent of all HIPAA compliance<\/span><\/a><span style=\"font-weight: 400;\"> issues.\u00a0 Employees may also disclose information improperly or expose it to unauthorized users.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Easy Ways to initiate successful HIPAA compliance<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The all-important HIPAA security rule features three parts: administrative safeguards, physical safeguards, and technical safeguards. Each one possesses its specific set of specifications, and each one is addressable or required.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You\u2019re not to ignore an addressable specification. Instead, it means safeguard implementation is somewhat flexible. If an addressable safeguard is a good-fit implementation for an organization, they can use an alternative or ignore implementing it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Note that it\u2019s important to document such a decision and be available to defend it during an audit.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">#1 Technical safeguards<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">It deals with the technology a business employs to protect and access ePHI. In implementing safeguards, the most relevant mechanism, in their opinion, is what an organization should use. The only exception is <\/span><a href=\"https:\/\/blogs.gartner.com\/anton-chuvakin\/2016\/05\/09\/our-understanding-insider-threats-paper-publishes\/\"><span style=\"font-weight: 400;\">ePHI encryption<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Companies may fail to:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Implement an access control mechanism<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Introduce a way to authenticate ePHI<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Implement encryption and decryption tools<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Use audit controls and activity logs<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Ensure computers and other devices log off automatically<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">#2 Physical safeguards<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">HIPAA physical safeguards deal with the storage location of ePHI. This location may be <\/span><a href=\"https:\/\/www.m2sys.com\/blog\/cloud-computing\/the-beginners-guide-for-ensuring-the-security-of-cloud-hosted-data\/\"><span style=\"font-weight: 400;\">cloud-based storage<\/span><\/a><span style=\"font-weight: 400;\">, a data center, a physical location belonging to the covered entity, or another convenient place.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Physical safeguards specify standards for physically safeguarding ePHI.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Companies may fail to fulfill the following requirements:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Detailed hardware inventory<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Adequate facility access controls<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Policies for workstation use and positioning<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Policies and procedures for mobile devices<\/span><\/li>\n<\/ul>\n<p><iframe loading=\"lazy\" title=\"HIPAA Ready - HIPAA Compliance Management Software | Free HIPAA Certification &amp;  HIPAA Training\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/QZS4QML3eyY?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<h3><span style=\"font-weight: 400;\">#3 Administrative safeguards<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Administrative safeguards comprise policies and procedures that regulate a company\u2019s conduct. They also integrate the privacy rule and the security rule into <\/span><a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/principle-of-least-privilege-POLP\"><span style=\"font-weight: 400;\">one set of actions and policies<\/span><\/a><span style=\"font-weight: 400;\">. According to HIPAA, there should be one security officer and one privacy officer who have the sole task of implementing these guards.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Again, companies may fall short of full compliance in the following areas:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Improving employee security awareness through training<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Performing risk assessments<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Implementing a robust risk management policy<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Restraining third-party access<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Reporting security incidents<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Working out a contingency plan<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Testing the contingency plan to expose any weaknesses<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">Conclusion<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">While HIPAA deals with a specific variety of information, controls, and safeguards for safeguarding ePHI are similar to those in other cybersecurity frameworks. Therefore, a comprehensive and secured information management program like <\/span><a href=\"https:\/\/cloudapper.com\/hipaa-ready-compliance-software\/\"><span style=\"font-weight: 400;\">HIPAAReady<\/span><\/a><span style=\"font-weight: 400;\"> can serve as a useful reference and foundation to meet HIPAA requirements. It can centralize all the information and simplify compliance by reducing administrative burden. Ensure your company passes routine HIPAA audits HIPAAReady.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Health Insurance Portability and Accountability Act (HIPAA) of 1996 Security Rule defines standards to protect the electronic personal health<\/p>\n","protected":false},"author":383,"featured_media":12639,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"How Can Companies Initiate Successful HIPAA Compliance?","_yoast_wpseo_metadesc":"A comprehensive and secured information management program like HIPAAReady can serve as a useful reference and foundation to meet HIPAA requirements.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[197],"tags":[379,1459,1471],"class_list":["post-12637","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-patient-identification","tag-hipaa","tag-hipaa-complaince","tag-hipaa-ready"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Can Companies Initiate Successful HIPAA Compliance?<\/title>\n<meta name=\"description\" content=\"A comprehensive and secured information management program like HIPAAReady can serve as a useful reference and foundation to meet HIPAA requirements.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-can-companies-initiate-successful-hipaa-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Can Companies Initiate Successful HIPAA Compliance?\" \/>\n<meta property=\"og:description\" content=\"A comprehensive and secured information management program like HIPAAReady can serve as a useful reference and foundation to meet HIPAA requirements.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-can-companies-initiate-successful-hipaa-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-20T10:40:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-21T12:06:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/05\/national-cancer-institute-NFvdKIhxYlU-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Matthew Bennett\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthew Bennett\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-can-companies-initiate-successful-hipaa-compliance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-can-companies-initiate-successful-hipaa-compliance\/\"},\"author\":{\"name\":\"Matthew Bennett\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4ee8a06d75140a7a10ac2b0f02c5e792\"},\"headline\":\"How Can Companies Initiate Successful HIPAA Compliance?\",\"datePublished\":\"2020-05-20T10:40:55+00:00\",\"dateModified\":\"2022-06-21T12:06:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-can-companies-initiate-successful-hipaa-compliance\/\"},\"wordCount\":1125,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"HIPAA\",\"HIPAA Complaince\",\"HIPAA Ready\"],\"articleSection\":[\"Patient Identification\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-can-companies-initiate-successful-hipaa-compliance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-can-companies-initiate-successful-hipaa-compliance\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-can-companies-initiate-successful-hipaa-compliance\/\",\"name\":\"How Can Companies Initiate Successful HIPAA Compliance?\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2020-05-20T10:40:55+00:00\",\"dateModified\":\"2022-06-21T12:06:17+00:00\",\"description\":\"A comprehensive and secured information management program like HIPAAReady can serve as a useful reference and foundation to meet HIPAA requirements.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-can-companies-initiate-successful-hipaa-compliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-can-companies-initiate-successful-hipaa-compliance\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-can-companies-initiate-successful-hipaa-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"How Can Companies Initiate Successful HIPAA Compliance?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4ee8a06d75140a7a10ac2b0f02c5e792\",\"name\":\"Matthew Bennett\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg\",\"caption\":\"Matthew Bennett\"},\"description\":\"The author leads the digital marketing team at M2SYS Technology and an occasional blogger. He is passionate about writing various government and enterprise biometric identity management technology adoption related topics and the changes it brings on the general people\u2019s lives.\",\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/shaon\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Can Companies Initiate Successful HIPAA Compliance?","description":"A comprehensive and secured information management program like HIPAAReady can serve as a useful reference and foundation to meet HIPAA requirements.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-can-companies-initiate-successful-hipaa-compliance\/","og_locale":"en_US","og_type":"article","og_title":"How Can Companies Initiate Successful HIPAA Compliance?","og_description":"A comprehensive and secured information management program like HIPAAReady can serve as a useful reference and foundation to meet HIPAA requirements.","og_url":"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-can-companies-initiate-successful-hipaa-compliance\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2020-05-20T10:40:55+00:00","article_modified_time":"2022-06-21T12:06:17+00:00","og_image":[{"width":648,"height":432,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/05\/national-cancer-institute-NFvdKIhxYlU-unsplash.jpg","type":"image\/jpeg"}],"author":"Matthew Bennett","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Matthew Bennett","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-can-companies-initiate-successful-hipaa-compliance\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-can-companies-initiate-successful-hipaa-compliance\/"},"author":{"name":"Matthew Bennett","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4ee8a06d75140a7a10ac2b0f02c5e792"},"headline":"How Can Companies Initiate Successful HIPAA Compliance?","datePublished":"2020-05-20T10:40:55+00:00","dateModified":"2022-06-21T12:06:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-can-companies-initiate-successful-hipaa-compliance\/"},"wordCount":1125,"commentCount":1,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["HIPAA","HIPAA Complaince","HIPAA Ready"],"articleSection":["Patient Identification"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/patient-identification\/how-can-companies-initiate-successful-hipaa-compliance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-can-companies-initiate-successful-hipaa-compliance\/","url":"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-can-companies-initiate-successful-hipaa-compliance\/","name":"How Can Companies Initiate Successful HIPAA Compliance?","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2020-05-20T10:40:55+00:00","dateModified":"2022-06-21T12:06:17+00:00","description":"A comprehensive and secured information management program like HIPAAReady can serve as a useful reference and foundation to meet HIPAA requirements.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-can-companies-initiate-successful-hipaa-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/patient-identification\/how-can-companies-initiate-successful-hipaa-compliance\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/how-can-companies-initiate-successful-hipaa-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"How Can Companies Initiate Successful HIPAA Compliance?"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4ee8a06d75140a7a10ac2b0f02c5e792","name":"Matthew Bennett","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg","caption":"Matthew Bennett"},"description":"The author leads the digital marketing team at M2SYS Technology and an occasional blogger. He is passionate about writing various government and enterprise biometric identity management technology adoption related topics and the changes it brings on the general people\u2019s lives.","url":"https:\/\/www.m2sys.com\/blog\/author\/shaon\/"}]}},"modified_by":"Stanly Palma","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/12637"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/383"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=12637"}],"version-history":[{"count":6,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/12637\/revisions"}],"predecessor-version":[{"id":13530,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/12637\/revisions\/13530"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/12639"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=12637"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=12637"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=12637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}