Claude Code Plugins

Community-maintained marketplace

Feedback

Healthcare Compliance

@eddiebe147/claude-settings
0
0

HIPAA compliance, healthcare regulations, privacy and security standards for medical organizations and providers

Install Skill

1Download skill
2Enable skills in Claude

Open claude.ai/settings/capabilities and find the "Skills" section

3Upload to Claude

Click "Upload skill" and select the downloaded ZIP file

Note: Please verify skill by going through its instructions before using it.

SKILL.md

name Healthcare Compliance
slug healthcare-compliance
description HIPAA compliance, healthcare regulations, privacy and security standards for medical organizations and providers
category domain
complexity complex
version 1.0.0
author ID8Labs
triggers HIPAA compliance, healthcare privacy, PHI protection, medical compliance, healthcare security, patient data privacy
tags healthcare, compliance, HIPAA, privacy, security, regulations

Healthcare Compliance

Expert healthcare regulatory compliance system designed for medical practices, healthcare organizations, health IT companies, and healthcare professionals navigating complex privacy, security, and operational regulations. This skill provides HIPAA compliance guidance, privacy and security assessments, breach response protocols, policy development, training frameworks, and regulatory requirement interpretation.

The Healthcare Compliance skill excels at translating complex regulations into actionable compliance programs, conducting risk assessments, developing policies and procedures, creating staff training materials, managing business associate agreements, and establishing incident response plans. It's valuable for compliance officers, practice administrators, healthcare IT teams, and providers ensuring regulatory adherence.

Critical Legal Disclaimer: This skill provides educational information and compliance frameworks based on federal regulations (primarily HIPAA). It does NOT constitute legal advice. Healthcare compliance is complex, high-stakes, and subject to interpretation. State laws may impose additional requirements. Always consult qualified healthcare attorneys and compliance professionals for legal guidance, especially regarding breach notifications, enforcement actions, and regulatory interpretations.

Core Workflows

Workflow 1: HIPAA Compliance Assessment & Implementation

Purpose: Evaluate current compliance posture and implement comprehensive HIPAA privacy and security programs.

HIPAA Overview:

The Health Insurance Portability and Accountability Act (HIPAA) has three main rules:

1. Privacy Rule

  • Protects all "individually identifiable health information" (Protected Health Information - PHI)
  • Establishes patient rights over their health information
  • Sets boundaries on uses and disclosures
  • Applies to: Covered entities (healthcare providers, health plans, clearinghouses) and business associates

2. Security Rule

  • Establishes national standards for protecting electronic PHI (ePHI)
  • Requires administrative, physical, and technical safeguards
  • Flexible implementation based on size and complexity
  • Risk assessment is foundational requirement

3. Breach Notification Rule

  • Requires notification of breaches of unsecured PHI
  • Notification to individuals, HHS, and media (if 500+ affected)
  • Specific timelines and content requirements
  • Penalties for non-compliance

Compliance Assessment Framework:

Step 1: Determine Covered Entity Status

  • Are you a healthcare provider who transmits health information electronically?
  • Are you a health plan?
  • Are you a healthcare clearinghouse?
  • Are you a business associate of a covered entity?
  • If YES to any: HIPAA applies to you

Step 2: Identify PHI and ePHI

What is PHI?

  • Any health information that can identify an individual
  • Includes: Medical records, billing records, conversations about care, health insurance information
  • 18 identifiers make information PHI:
    1. Names
    2. Addresses (more specific than state)
    3. Dates (except year) related to individual
    4. Phone numbers
    5. Fax numbers
    6. Email addresses
    7. Social Security numbers
    8. Medical record numbers
    9. Health plan beneficiary numbers
    10. Account numbers
    11. Certificate/license numbers
    12. Vehicle identifiers
    13. Device identifiers/serial numbers
    14. URLs
    15. IP addresses
    16. Biometric identifiers
    17. Full-face photos
    18. Any other unique identifier

Where is PHI in your organization?

  • Electronic health records (EHR/EMR)
  • Practice management systems
  • Billing systems
  • Email communications
  • Patient portals
  • Paper charts and files
  • Fax machines
  • Mobile devices (phones, tablets, laptops)
  • Backup systems and archives
  • Third-party services (vendors, cloud providers)

Step 3: Privacy Rule Compliance

Notice of Privacy Practices (NPP):

  • Required written notice to patients describing how you use/disclose PHI
  • Must be provided at first contact
  • Acknowledgment of receipt required (best effort)
  • Post prominently, make available on website
  • Review and update every 3 years or when material change

Minimum Necessary Standard:

  • Use/disclose only minimum PHI necessary to accomplish purpose
  • Does not apply to: Treatment, patient-authorized disclosures, disclosures to HHS for compliance review
  • Implement policies defining "minimum necessary" for routine disclosures

Patient Rights:

  • Right to access: Provide copy of PHI within 30 days (may extend 30 days once)
  • Right to amend: Allow patient to request corrections
  • Right to accounting of disclosures: Track and report certain disclosures
  • Right to restrict uses/disclosures: Must honor restrictions if agree
  • Right to confidential communications: Alternative contact methods if requested
  • Right to copy of NPP: Provide upon request

Permitted Uses and Disclosures:

  • Treatment, Payment, Operations (TPO): Allowed without authorization
  • Patient authorization: Written permission required for most other uses
  • Required by law: Certain disclosures mandated (public health, abuse reporting, law enforcement in specific situations)

Step 4: Security Rule Compliance

Administrative Safeguards:

  1. Security Management Process:

    • Risk Assessment (required): Identify threats/vulnerabilities to ePHI
    • Risk Management (required): Implement measures to reduce risks
    • Sanction Policy (required): Discipline for security violations
    • Information System Activity Review (required): Monitor logs and access
  2. Assigned Security Responsibility (required):

    • Designate a Security Official responsible for compliance
  3. Workforce Security:

    • Authorization/supervision procedures
    • Workforce clearance procedures
    • Termination procedures (remove access immediately)
  4. Information Access Management:

    • Access authorization (role-based access control)
    • Access establishment and modification
  5. Security Awareness and Training (required):

    • Security reminders
    • Protection from malicious software
    • Log-in monitoring
    • Password management
  6. Security Incident Procedures (required):

    • Identify and respond to security incidents
    • Document incidents
  7. Contingency Plan (required):

    • Data backup plan
    • Disaster recovery plan
    • Emergency mode operation plan
  8. Evaluation (required):

    • Periodic security evaluation
  9. Business Associate Contracts (required):

    • Written agreements with vendors handling ePHI
    • Must include specific required provisions

Physical Safeguards:

  1. Facility Access Controls:

    • Contingency operations (allow access during emergencies)
    • Facility security plan (protect from unauthorized access)
    • Access control and validation procedures
    • Maintenance records (repairs/modifications to security systems)
  2. Workstation Use (required):

    • Policies on how/where workstations can be used
  3. Workstation Security (required):

    • Physical safeguards for workstations
  4. Device and Media Controls (required):

    • Disposal (wipe devices before disposal/reuse)
    • Media re-use (remove ePHI before reusing media)
    • Accountability (track hardware/media movements)
    • Data backup and storage

Technical Safeguards:

  1. Access Control (required):

    • Unique user identification (required): Each user has unique ID
    • Emergency access procedure (required): Access during emergencies
    • Automatic logoff (addressable): Time-out after inactivity
    • Encryption and decryption (addressable): Encrypt ePHI when appropriate
  2. Audit Controls (required):

    • Log and monitor activity on systems with ePHI
  3. Integrity (required):

    • Protect ePHI from improper alteration/destruction
    • Mechanism to authenticate ePHI (addressable)
  4. Person or Entity Authentication (required):

    • Verify identity before granting access
  5. Transmission Security (required):

    • Integrity controls: Ensure data isn't altered in transit
    • Encryption: Encrypt ePHI during transmission when appropriate

Implementation Specifications:

  • Required: Must implement
  • Addressable: Implement if reasonable and appropriate; if not, document why and what alternative you implemented

Step 5: Breach Notification Compliance

What is a breach?

  • Acquisition, access, use, or disclosure of PHI not permitted under Privacy Rule
  • Compromises security or privacy of PHI
  • Exceptions (not a breach):
    • Unintentional access/use by workforce within scope of authority (if no further impermissible disclosure)
    • Inadvertent disclosure within organization to someone authorized to access PHI
    • Disclosure where recipient couldn't reasonably have retained the information

Risk Assessment Required: Determine if unauthorized acquisition/disclosure poses significant risk of harm. Consider:

  1. Nature and extent of PHI involved
  2. Unauthorized person who used/received PHI
  3. Whether PHI was actually acquired or viewed
  4. Extent to which risk has been mitigated

If Breach (risk of harm):

Notification to Individuals (required):

  • Timing: Without unreasonable delay, no later than 60 days from discovery
  • Method: First-class mail to last known address (or email if patient agreed)
  • Content must include:
    • Brief description of what happened
    • Description of PHI involved
    • Steps individuals should take to protect themselves
    • What organization is doing to investigate, mitigate, prevent recurrence
    • Contact information for questions

Notification to HHS:

Notification to Media (if 500+):

  • Prominent media outlets in affected state/jurisdiction
  • Without unreasonable delay, no later than 60 days

Documentation:

  • All breaches (regardless of size) must be documented
  • Maintain for 6 years

Deliverables:

  • HIPAA compliance gap analysis
  • Privacy policies and procedures
  • Security policies and procedures
  • Risk assessment report
  • Remediation action plan
  • Breach response protocol

Workflow 2: Business Associate Agreements (BAAs)

Purpose: Properly contract with vendors and service providers who handle PHI on your behalf.

Who Needs a BAA?

Business Associate = Any entity that:

  1. Performs function/activity on behalf of covered entity
  2. Involves use or disclosure of PHI
  3. Is not part of covered entity's workforce

Common Business Associates:

  • IT vendors (EHR, practice management, email hosting, cloud storage)
  • Billing companies
  • Attorneys, accountants, consultants (if they access PHI)
  • Shredding/disposal services
  • Answering services
  • Transcription services
  • Health information exchanges
  • Patient portals
  • Email/fax services
  • Analytics companies

Required BAA Provisions:

Business Associate Must:

  1. Not use/disclose PHI except as permitted by agreement or required by law
  2. Use appropriate safeguards to prevent misuse of PHI
  3. Report to covered entity any unauthorized use/disclosure
  4. Ensure subcontractors with PHI access agree to same restrictions (subcontractor BAAs)
  5. Make PHI available to individuals upon request
  6. Make PHI available for amendment
  7. Provide accounting of disclosures
  8. Make internal practices, books, records available to HHS for compliance review
  9. Return or destroy PHI at termination (if feasible)

Covered Entity Must: 10. Notify business associate of limitations in NPP, if any 11. Notify business associate of patient restrictions it must comply with 12. Not request business associate to use/disclose PHI in violation of HIPAA

Agreement Must: 13. Authorize termination if business associate violates material term 14. Include business associate's obligation to comply with Security Rule requirements

BAA Process:

Step 1: Inventory Vendors

  • List all third parties with potential PHI access
  • Categorize: Definitely BA, Possibly BA, Not BA

Step 2: Request BAAs

  • Send BAA template or request vendor's BAA
  • Review vendor BAA for required provisions
  • Negotiate if deficient

Step 3: Maintain BAA Records

  • Signed BAAs from all business associates
  • Track BAA expiration and renewal dates
  • Update when services change

Step 4: Monitor Compliance

  • Periodic vendor compliance reviews
  • Review vendor security practices
  • Respond to vendor breaches/incidents

What if vendor refuses to sign BAA?

  • You cannot use them (if they're truly a BA)
  • Either find alternative vendor or bring function in-house
  • Using a BA without BAA is HIPAA violation

Deliverables:

  • Business associate inventory
  • BAA template (compliant with HIPAA requirements)
  • Vendor assessment questionnaire
  • BAA tracking spreadsheet
  • Vendor compliance monitoring protocol

Workflow 3: Staff Training & Awareness Program

Purpose: Ensure all workforce members understand and comply with HIPAA requirements.

Training Requirements:

Who Must Be Trained:

  • All workforce members (employees, volunteers, trainees, contractors)
  • Anyone with access to PHI or ePHI
  • New hires before PHI access
  • Existing staff when policies change

Training Content:

1. HIPAA Basics (30 min):

  • What is HIPAA and why it matters
  • Covered entity vs. business associate
  • What is PHI and ePHI
  • Consequences of violations (to organization and individual)

2. Privacy Training (45 min):

  • Notice of Privacy Practices
  • Permitted uses and disclosures
  • When authorization is required
  • Minimum necessary standard
  • Patient rights
  • Confidentiality obligations
  • Proper disposal of PHI
  • Incidental disclosures and how to minimize

3. Security Training (45 min):

  • Password management and authentication
  • Workstation security (lock screens, position monitors, clean desk)
  • Email security (no PHI in unencrypted email)
  • Mobile device security (encryption, remote wipe)
  • Physical security (visitor management, access badges)
  • Malware and phishing awareness
  • Incident reporting

4. Breach Response (30 min):

  • What constitutes a breach
  • How to recognize potential breaches
  • Immediate steps (stop, contain, report)
  • Reporting chain (to whom, how quickly)
  • Do's and don'ts during investigation

5. Role-Specific Training:

  • Clinical staff: Patient communication, chart access, release of information
  • Front desk: Check-in procedures, phone protocols, visitor management
  • IT staff: Security configurations, access management, audit logging
  • Billing: Claims submission, payment posting, collections communications
  • Management: Oversight responsibilities, complaint handling, sanction policy

Training Schedule:

  • Initial training: Before PHI access
  • Annual refresher: Required for all staff
  • Policy change training: Within reasonable time of material change
  • Incident-based training: If pattern of violations in certain area

Training Documentation:

  • Attendance records (date, topic, attendees)
  • Training materials (presentations, handouts)
  • Test/quiz results (if applicable)
  • Acknowledgment signatures
  • Maintain for 6 years

Ongoing Awareness:

  • Monthly privacy/security tips (email, posters)
  • Scenario-based learning (case studies, quizzes)
  • Simulated phishing tests
  • Incident debriefs (lessons learned, no names)
  • Privacy champions program (staff advocates)

Deliverables:

  • HIPAA training curriculum (presentations, handouts, tests)
  • Training schedule and tracking system
  • Acknowledgment forms
  • Quick reference guides (wallet cards, desk references)
  • Awareness campaign materials (posters, email templates)

Workflow 4: Risk Assessment & Security Remediation

Purpose: Identify and mitigate threats and vulnerabilities to ePHI confidentiality, integrity, and availability.

Risk Assessment Process:

Step 1: Scope Definition

  • Identify all locations where ePHI is stored, transmitted, or accessed
  • Include: Servers, workstations, mobile devices, removable media, paper records scanned/stored electronically, third-party systems

Step 2: Threat Identification

Human Threats:

  • Insider theft or snooping (unauthorized access)
  • Social engineering (phishing, pretexting)
  • Human error (misconfiguration, lost devices)
  • Malicious insider (sabotage, data exfiltration)

Environmental Threats:

  • Natural disasters (fire, flood, earthquake)
  • Power outages
  • Equipment failure (hardware, software)

Technical Threats:

  • Malware (ransomware, viruses, spyware)
  • Hacking and network intrusions
  • Denial of service attacks
  • Unpatched software vulnerabilities

Step 3: Vulnerability Assessment

Administrative:

  • Lack of policies/procedures
  • Insufficient training
  • No background checks
  • Inadequate incident response plan
  • Missing business associate agreements

Physical:

  • Unlocked doors/cabinets
  • Unattended workstations
  • Visitor access not controlled
  • No disposal policy (trash diving risk)
  • Portable devices not encrypted

Technical:

  • Weak passwords or no multi-factor authentication
  • Unencrypted data (at rest and in transit)
  • No audit logging or log review
  • Outdated/unpatched systems
  • No anti-malware protection
  • Unrestricted network access

Step 4: Likelihood & Impact Assessment

Likelihood:

  • High: Likely to occur within a year
  • Medium: Could occur within 1-3 years
  • Low: Unlikely but possible

Impact (if breach occurs):

  • High: Significant harm (financial, reputation, patient safety)
  • Medium: Moderate harm
  • Low: Minimal harm

Risk Level = Likelihood × Impact:

  • High risk: Immediate remediation required
  • Medium risk: Remediate within 6-12 months
  • Low risk: Monitor and remediate as resources allow

Step 5: Risk Mitigation

For each risk, choose mitigation approach:

1. Reduce Risk (most common):

  • Implement controls to lower likelihood or impact
  • Example: Deploy anti-malware to reduce malware risk

2. Accept Risk:

  • Consciously decide to accept the risk
  • Document rationale (why and what residual risk remains)
  • Example: Small practice accepts risk of natural disaster, relies on cloud backup instead of secondary site

3. Transfer Risk:

  • Shift risk to third party (insurance, outsourcing)
  • Example: Cyber insurance policy

4. Avoid Risk:

  • Eliminate the activity creating the risk
  • Example: Stop using personal devices for work (BYOD policy)

Common Security Controls:

Access Controls:

  • Unique user IDs for each person
  • Strong password requirements (12+ characters, complexity, rotation)
  • Multi-factor authentication (MFA) for remote access and high-privilege accounts
  • Role-based access (least privilege principle)
  • Automatic logoff after 15 minutes inactivity
  • Immediate access termination upon departure

Encryption:

  • Full-disk encryption on laptops and mobile devices
  • Encrypt ePHI in transit (TLS 1.2+ for web, encrypted email for PHI)
  • Encrypt backups and archives
  • Consider encryption for ePHI at rest on servers

Malware Protection:

  • Anti-virus/anti-malware on all systems
  • Automatic updates and scans
  • Email filtering (spam and malicious attachments)
  • Web filtering (block malicious sites)

Patch Management:

  • Regular security updates for OS and applications
  • Critical patches within 30 days (or faster if actively exploited)
  • Test patches before deployment if possible

Audit Logging:

  • Enable logs on all systems with ePHI
  • Log authentication, access, modifications, deletions
  • Review logs regularly (at least quarterly)
  • Retain logs for 6 years

Backup and Recovery:

  • Daily backups of ePHI
  • Store backups securely (encrypted, off-site or cloud)
  • Test restores quarterly
  • Document recovery time objectives (RTO) and recovery point objectives (RPO)

Physical Security:

  • Locked server rooms and wiring closets
  • Visitor sign-in and escorts
  • Security cameras in sensitive areas
  • Secure disposal (shred paper, wipe devices)

Network Security:

  • Firewall protecting internal network
  • Separate guest WiFi from corporate network
  • VPN for remote access
  • Network segmentation (isolate ePHI systems if possible)
  • Intrusion detection/prevention (IDS/IPS) if appropriate

Step 6: Documentation

  • Risk assessment report
  • Risk mitigation plan with timelines and owners
  • Residual risk acceptance documentation
  • Reassess annually or when significant changes

Deliverables:

  • Risk assessment report (threats, vulnerabilities, likelihood, impact, risk level)
  • Security remediation plan (prioritized actions with timelines)
  • Policies and procedures to address identified risks
  • Control implementation verification

Quick Reference

Action Command/Trigger
HIPAA compliance checklist "HIPAA compliance requirements for [organization type]"
BAA template "Create business associate agreement"
Privacy policy "Draft HIPAA privacy policy"
Security policy "Draft HIPAA security policy"
Breach assessment "Is this a HIPAA breach? [scenario]"
Breach notification "Draft breach notification letter"
Training curriculum "HIPAA training outline for [role]"
Risk assessment "Conduct HIPAA risk assessment for [environment]"
Incident response "HIPAA breach response steps"
Patient rights "How to handle patient request for [right]"

Best Practices

HIPAA Compliance

  • Document everything - If it's not written down, you didn't do it
  • Annual reviews - Reassess risks, update policies, retrain staff
  • Culture of compliance - Make privacy and security everyone's responsibility
  • Report incidents promptly - Faster response = less harm, demonstrates good faith
  • Encrypt by default - Easier than tracking what's encrypted and what's not

Privacy Protection

  • Minimum necessary - Share only what's needed, nothing more
  • Verify before disclosing - Confirm identity before giving PHI
  • Avoid public discussions - No patient info in hallways, elevators, cafeterias
  • Secure communications - No PHI in regular email or text
  • Clean desk policy - Lock up or put away PHI when not in use

Security Hygiene

  • Strong, unique passwords - Use password manager
  • Enable MFA - Everywhere it's available
  • Lock your screen - Every time you walk away
  • Think before clicking - Phishing is #1 way attackers get in
  • Keep software updated - Patches fix vulnerabilities
  • Report suspicious activity - If something seems off, say something

Vendor Management

  • BAAs are mandatory - No exceptions for business associates
  • Assess vendor security - Don't just take their word for it
  • Monitor vendor compliance - Ongoing responsibility, not one-time
  • Have vendor breach provisions - Know what happens if they're breached
  • Plan for vendor changes - What if vendor goes out of business?

Breach Response

  • Have a plan before you need it - Panic during breach is too late
  • Assume breach, not mistake - Treat seriously until proven otherwise
  • Contain quickly - Stop ongoing access/disclosure immediately
  • Preserve evidence - Don't delete logs or affected systems
  • Get help - Engage forensics, legal, compliance experts early
  • Communicate carefully - What you say can be used against you

State-Specific Considerations

HIPAA is federal floor, not ceiling: Many states have stricter requirements. Always comply with whichever is more stringent.

Common State Variations:

California (CMIA, CCPA):

  • Stricter confidentiality requirements
  • Patient authorization required for some disclosures allowed under HIPAA
  • Additional breach notification requirements under CCPA
  • Specific requirements for HIV, mental health, substance abuse treatment

Texas:

  • Stricter mental health confidentiality
  • Medical peer review privilege protections

New York:

  • Cybersecurity requirements for financial services (23 NYCRR 500) may apply to health plans

Washington:

  • Protections for sensitive health information (HIV, mental health, genetic testing)

Massachusetts:

  • Strict data breach notification law
  • Written information security program (WISP) required

Consult state laws for:

  • Mental health and substance abuse treatment records (often extra protection)
  • HIV/AIDS status (often requires specific consent)
  • Genetic information (GINA and state laws)
  • Minors' consent and parental access
  • Reproductive health services
  • Sexually transmitted infections

Enforcement & Penalties

OCR (Office for Civil Rights) Enforcement:

Violation Categories & Penalties:

Tier 1: Individual did not know and could not have known

  • $100-$50,000 per violation
  • $25,000 annual max per violation type

Tier 2: Violation due to reasonable cause, not willful neglect

  • $1,000-$50,000 per violation
  • $100,000 annual max per violation type

Tier 3: Violation due to willful neglect, corrected within 30 days

  • $10,000-$50,000 per violation
  • $250,000 annual max per violation type

Tier 4: Violation due to willful neglect, not corrected

  • $50,000 per violation (minimum)
  • $1.5 million annual max per violation type

Criminal Penalties (DOJ):

  • Knowingly obtaining/disclosing PHI: Up to $50,000 fine, 1 year prison
  • Under false pretenses: Up to $100,000 fine, 5 years prison
  • Intent to sell/transfer/use for commercial advantage, personal gain, or malicious harm: Up to $250,000 fine, 10 years prison

State Attorneys General:

  • Can bring civil actions on behalf of state residents
  • Additional state penalties may apply

Private Right of Action:

  • HIPAA does not create private right to sue
  • However, state laws may allow patient lawsuits
  • Breach can support malpractice or negligence claims

Confidence Signaling

High Confidence Areas:

  • HIPAA Privacy, Security, and Breach Notification Rule requirements
  • Common compliance program elements and best practices
  • Risk assessment methodologies
  • Business associate agreement provisions
  • General training and awareness strategies

Medium Confidence Areas:

  • State-specific privacy laws and variations
  • Complex disclosure scenarios and permitted uses
  • Technical security implementation details
  • Intersection of HIPAA with other regulations (FDA, FTC, state laws)
  • International data transfer under HIPAA (rare scenario)

Requires Legal/Compliance Expertise:

  • Breach notification decisions (is it reportable?)
  • OCR complaint response and investigation
  • Civil monetary penalty cases
  • Criminal HIPAA violations
  • Multi-state compliance (large organizations)
  • Research and clinical trial HIPAA application
  • Specialized settings (substance abuse, mental health, correctional)
  • HIPAA and marketing/fundraising rules (complex area)

Always Consult Experts For:

  • Breach notification decisions (attorney and compliance officer)
  • OCR audits, investigations, or enforcement actions
  • Complex disclosure requests (subpoenas, law enforcement)
  • Marketing and fundraising uses of PHI
  • Research authorizations and de-identification
  • Mergers, acquisitions, practice sales (due diligence)
  • International health data transfers

Resources

Government:

  • HHS Office for Civil Rights: hhs.gov/ocr/privacy
  • OCR HIPAA guidance and FAQs
  • Sample BAA and Notice of Privacy Practices
  • Breach notification tool and portal

Industry:

  • AHIMA (American Health Information Management Association)
  • HIMSS (Healthcare Information and Management Systems Society)
  • HCCA (Health Care Compliance Association)
  • HITRUST (security framework based on HIPAA)

Tools:

  • NIST Cybersecurity Framework (risk management)
  • HIPAA Security Rule Toolkit (HHS resources)
  • SRA Tool (HHS risk assessment guidance)

Training:

  • HHS free online training courses
  • ComplianceJunction, MedPro, HealthcareSource (commercial training)

Final Reminder: Healthcare compliance is a legal minefield with serious civil and criminal penalties. This skill provides educational information and compliance frameworks, but it is NOT legal advice. HIPAA is subject to interpretation, state laws vary, and enforcement evolves. Always work with qualified healthcare compliance professionals and attorneys, especially for breach notifications, enforcement actions, and complex compliance scenarios. When in doubt, consult experts before acting.