Glossary of Compliance
Compliance Glossary
Our list of curated compliance glossary offers everything you to know about compliance in one place.
HIPAA Privacy Practices
Covered entities must provide a Notice of Privacy Practices (Privacy Notice) to every individual whose PHI is processed by them. Healthcare providers send this notice to new enrollees during initiation and at least once every three years to the existing ones. Self-insured health plans create their own Privacy Notices, while fully insured plans rely on their insurance issuers for this.
How to provide the notice?
- Any person who requests the Privacy Notice should receive it
- The notice must be prominently displayed on the entity’s website if it provides customer service or benefit information there
- Health plans must give the notice to current members by April 14, 2003 (or April 14, 2004, for smaller plans) and to new enrollees during enrollment
- If the notice changes significantly, it should be reissued within 60 days
- Covered Direct Treatment Providers must give the notice to patients at the first service encounter, and efforts should be made to get a written acknowledgment
- For online or electronic service delivery, an electronic notice should be sent upon the patient’s request
- In emergencies, the notice should be provided as soon as possible, and acknowledgment is not required
- The latest notice reflecting any changes should be available for patients to take and be prominently displayed at the provider’s facility
- If a patient agrees, the notice can be sent via email
Additional reading
Mastering Data Center Compliance: Your Go-to Guide
A data center houses critical infrastructure and client’s sensitive information. More often than not, the client’s auditor seeks assurance that the data center complies with the relevant standards and has appropriate data protection measures. The clients, in turn, inquire about the certifications it possesses and the strength of the data center’s security processes. Ensuring a…
Cyber Security Risk Assessments: How to Protect Your Business
Digital assets and data are the lifeblood of every organization today. But as with everything precious, they’re constantly at risk of being unlawfully accessed, tampered with, stolen, or transmitted. Such malicious actions can not only cause irreparable harm and damage to the organization but can severely hamper future business prospects. Cyber risk assessments are periodical…
SOC 2 Criteria Mapping to ISO 27001 Controls
SOC 2 and ISO 27001 are both crucial compliance certifications that organizations go for in their compliance journey to enhance security and accelerate growth. Getting compliant with either of these compliances can be time taking and strenuous on your teams. Now imagine getting compliant for both. Are we looking at doubled expenses, resource utilization, opportunity…
Sprinto: Your growth superpower
Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.