{"id":504,"date":"2021-05-06T10:25:21","date_gmt":"2021-05-06T14:25:21","guid":{"rendered":"https:\/\/www.harmonizehq.com\/blog\/?p=504"},"modified":"2021-06-08T01:53:17","modified_gmt":"2021-06-08T05:53:17","slug":"hipaa-compliance","status":"publish","type":"post","link":"https:\/\/www.harmonizehq.com\/blog\/hipaa-compliance\/","title":{"rendered":"HIPAA Compliance for Businesses"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">HIPAA is a complex law. It can often become a challenge knowing where to begin as it does not provide a clear standard for compliance. In 2018 breaching HIPAA laws cost ten companies <\/span><a href=\"https:\/\/www.modernhealthcare.com\/article\/20190208\/NEWS\/190209933\/hipaa-enforcements-hit-record-28-million-in-2018\"><span style=\"font-weight: 400;\">twenty-eight million dollars,<\/span><\/a><span style=\"font-weight: 400;\"> to avoid getting fined it is important to comply. This blog will guide you and help you stay compliant with HIPAA law.<\/span><\/p>\n<h2>What is HIPAA Compliance?<\/h2>\n<p><span style=\"font-weight: 400;\">The <\/span><a href=\"https:\/\/www.cdc.gov\/phlp\/publications\/topic\/hipaa.html\"><span style=\"font-weight: 400;\">Health Insurance Portability and Accountability Act (HIPAA)<\/span><\/a><span style=\"font-weight: 400;\"> sets the standard for safeguarding sensitive patients\u2019 protected health information (PHI). HIPAA compliance looks different for different organizations and is based upon the resources available to safeguard PHI. HIPAA laws set the standard for how the protected health information of patients is to be secured. Businesses that handle protected health information (PHI) must have in place administrative, technical, and physical measures in place to be compliant with HIPAA laws.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">HIPAA laws apply to two types of business entities: covered entities and business associates. Other related business associates such as subcontractors also have to be compliant with HIPAA laws and policy.\u00a0<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-506\" src=\"https:\/\/blog.harmonizehq.com\/wp-content\/uploads\/HIPPA-Compliance-Insurance-Cover.jpg\" alt=\"HIPPA Compliance Insurance Cover\" width=\"1280\" height=\"853\" srcset=\"https:\/\/blog.harmonizehq.com\/wp-content\/uploads\/HIPPA-Compliance-Insurance-Cover.jpg 1280w, https:\/\/blog.harmonizehq.com\/wp-content\/uploads\/HIPPA-Compliance-Insurance-Cover-300x200.jpg 300w, https:\/\/blog.harmonizehq.com\/wp-content\/uploads\/HIPPA-Compliance-Insurance-Cover-1024x682.jpg 1024w, https:\/\/blog.harmonizehq.com\/wp-content\/uploads\/HIPPA-Compliance-Insurance-Cover-768x512.jpg 768w, https:\/\/blog.harmonizehq.com\/wp-content\/uploads\/HIPPA-Compliance-Insurance-Cover-930x620.jpg 930w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/p>\n<h2>Protected Health Information (PHI) in HIPAA Compliance<\/h2>\n<p><span style=\"font-weight: 400;\">In HIPAA compliance, protected health information (PHI) is what the law protects. Protected health information (PHI) refers to any individually identifiable health information that is electronically transmitted and maintained, this is known as electronically protected health information (ePHI). It also includes individually identifiable health information that is transmitted or maintained through any other medium. Individually identifiable health information is any information that can be used as an identifier for the client or patient of an entity that is obligated to HIPAA law. Protected health information (PHI) includes medical records, name, address, telephone number, facial photos, social security numbers, and the list goes on.<\/span><\/p>\n<h2>Covered Entities in HIPAA Compliance<\/h2>\n<p><span style=\"font-weight: 400;\">Under HIPAA law, a covered entity is an organization or individual in a healthcare field that has access to protected health information. These are healthcare providers, health care insurance providers, health care clearing houses that create, collect or transmit protected health information.\u00a0<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The hospital employer is for the most part it not considered a covered entity. This is because the hospital is the covered entity with the responsibility to implement and enforce HIPAA compliance.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Employers that collect and maintain their employees\u2019 health care information are also generally not considered covered entities. However, if the employer provides certain benefits such as the Employee Assistance Program or self-insured health cover then they are considered to be a hybrid entity and still required to be HIPAA compliant.<\/span><\/p>\n<h2>What is a Business Associate in HIPAA Compliance?<\/h2>\n<p><span style=\"font-weight: 400;\">Similar to covered entities, under HIPAA laws business associates are individuals and organizations that are also responsible for following HIPAA laws because they work in a non-healthcare capacity with a covered entity and have access to protected health information. This includes accountants, lawyers, billing companies, physical or cloud storage providers, and much more. Based on the wide scope of these service providers they may process, handle or transmit protected health information in the process of carrying out their task.\u00a0<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<h2>HIPAA Rules<\/h2>\n<h3>HIPAA Privacy Rule<\/h3>\n<p><span style=\"font-weight: 400;\">HIPAA privacy rule is one of the key rules and foundations of HIPAA laws. It explains how and when organizations and individuals that handle protected information can use that information. It sets a standard for the patient&#8217;s right to protected health information. Some of these standards include the right of the patient to access their protected health information, the right of health care providers to deny access to protected health information, and the use of disclosure forms. These regulatory standards must be documented and training may be needed. It is important to note that this rule applies only to covered entities and not business associates.\u00a0<\/span><\/p>\n<h3>HIPAA Security Rule<\/h3>\n<p><span style=\"font-weight: 400;\">This sets the standard for maintaining, transmitting and handling electronically protected health information in a secure way. This applies to both business associates and covered entities. It also sets the standard for the physical, technical, and administrative safeguards that health care organizations must have in place to ensure the integrity and safety of electronically protected health information. These standards must be included in your HIPAA policies and procedures. It is also important for the staff to receive annual training on the company\u2019s policies and procedures and this should be documented.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To be compliant with the security rule, you must have administrative, physical, and technical safeguards in place.<\/span><\/p>\n<h4><strong>HIPAA compliance with physical safeguard<\/strong><\/h4>\n<p><span style=\"font-weight: 400;\">To be HIPAA compliant your physical safeguard should focus on physical access to protected health information regardless of where it is located. To be compliant you need to have limited access and control to protected health information with access authorization. There must be policies put in place to monitor access, use, reuse, transfer, and deleting of electronically protected health information (ePHI). ePHI could be stored on servers or in the cloud within the premises of the HIPAA compliant entity. The aim is to secure PHI against unauthorized access.<\/span><\/p>\n<h4><b>HIPAA compliance with technical safeguard<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Technical safeguards are the technology that is used to allow only those authorized to access electronically protected health data. To archive this a unique user identification can be used. You can also have a system of automatic log-off, encryption, and decryption. It is also important to have an access procedure. In the case of an emergency. The only requirement for the HIPAA law is that electronically protected health information must be encrypted once it goes beyond the internal firewall service of the organization. This makes the data unreadable and unusable should any breach occur.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is also important to keep a record of hardware and software activities so you can trace the source or cause of a security breach<\/span><\/p>\n<h4>HIPAA compliance with administrative safeguard<\/h4>\n<p><span style=\"font-weight: 400;\">The administrative safeguards marry the security rule and the privacy rule in HIPAA compliance. This requires both the security officer and privacy officer to implement measures to protect the electronic health information and also control or influence the conduct of the workforce. Some measures they can implement include risk assessment, risk management policy, training, and reporting. There are some required administrative safeguard measures such as risk assessment, risk management policy, developing a contingency plan in the event of an emergency, and restricting third-party access.<\/span><\/p>\n<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-507\" src=\"https:\/\/blog.harmonizehq.com\/wp-content\/uploads\/HIPPA-Compliance-1.jpg\" alt=\"HIPPA Compliance #1\" width=\"1280\" height=\"853\" srcset=\"https:\/\/blog.harmonizehq.com\/wp-content\/uploads\/HIPPA-Compliance-1.jpg 1280w, https:\/\/blog.harmonizehq.com\/wp-content\/uploads\/HIPPA-Compliance-1-300x200.jpg 300w, https:\/\/blog.harmonizehq.com\/wp-content\/uploads\/HIPPA-Compliance-1-1024x682.jpg 1024w, https:\/\/blog.harmonizehq.com\/wp-content\/uploads\/HIPPA-Compliance-1-768x512.jpg 768w, https:\/\/blog.harmonizehq.com\/wp-content\/uploads\/HIPPA-Compliance-1-930x620.jpg 930w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/p>\n<h4><b>HIPAA breach notification rule<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">This rule sets the standard that organizations must follow in the event of a breach of data containing PHI or ePHI. The breach notification rule distinguishes between two kinds of breaches: minor breaches and meaningful breaches. Covered entities are required to report all breaches including the minor breaches but the protocol for reporting changes depending on the type.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The rule requires that in the event of a breach of protected health information, covered entities have to promptly notify the patients and also the Department of Health and Human Services. If the breach affects more than five hundred patients the covered entity has to also notify the media. This must be done within 60 days.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If the breach affects less than five hundred patients in a single event then it can be reported in a single batch to the Department of Health and Human Serviced once a year per breach notification rule.<\/span><\/p>\n<h4><b>HIPAA omnibus rule<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">This rule makes it compulsory for business associates and their subcontractors to be compliant with HIPAA laws. It also outlines the rules surrounding the Business Associate Agreement.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Business Associate Agreement is an agreement between two business associates or between a covered entity and a business associate. This agreement must be signed between both parties before protected health information or electronically protected health information can be shared.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<h4>HIPAA enforcement rule<\/h4>\n<p><span style=\"font-weight: 400;\">This rule focuses on how the violation of HIPAA laws should be handled and investigated. Violations of HIPAA laws are to be reported to the Office for Civil Rights (OCR) for investigation. If after the investigation the Office for Civil Rights finds it to be a negligent violation, the cause of the breach must be fixed and the affected individuals dealt with to the satisfaction of the OCR.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If the Office for Civil Rights does not find the violator\u2019s response to the affected individuals satisfactory or if the breach is appalling the OCR can fine the violators.<\/span><\/p>\n<h2>How to Become HIPAA Compliant<\/h2>\n<div class=\"lyte-wrapper fourthree\" style=\"width:480px;max-width:100%;margin:5px auto;\"><div class=\"lyMe\" id=\"WYL_y751i4QqP0g\"><div id=\"lyte_y751i4QqP0g\" data-src=\"https:\/\/blog.harmonizehq.com\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=%2F%2Fi.ytimg.com%2Fvi%2Fy751i4QqP0g%2Fhqdefault.jpg\" class=\"pL\"><div class=\"tC\"><div class=\"tT\"><\/div><\/div><div class=\"play\"><\/div><div class=\"ctrl\"><div class=\"Lctrl\"><\/div><div class=\"Rctrl\"><\/div><\/div><\/div><noscript><a href=\"https:\/\/youtu.be\/y751i4QqP0g\"><img src=\"https:\/\/blog.harmonizehq.com\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2Fy751i4QqP0g%2F0.jpg\" alt=\"\" width=\"480\" height=\"340\" \/><br \/>Watch this video on YouTube<\/a><\/noscript><\/div><\/div><div class=\"lL\" style=\"max-width:100%;width:480px;margin:5px auto;\"><\/div><\/p>\n<p><span style=\"font-weight: 400;\">The first thing to do is to map the data your company collects and note where there is a HIPAA file on your premises.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Trace and monitor who can access these data and as much as possible reduce the number of people with access.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Create a system that notifies you when HIPAA data is accessed. This system should be able to distinguish and identify a potential breach of HIPAA from normal behavior.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Have two-factor authentication, unique identification, session timeouts, and other strong necessary measures to protect the perimeter. Also, monitor these activities to be aware of potential breaches.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Implement security risk assessments and implement remediation plans to cover the discovered gaps.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Have regular employee training so employees are aware of these policies and procedures.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Documentation is key for any compliance to work. Record all effort and steps taken to be HIPAA compliant. This is important for investigation. Also, document all breaches and notify patients and the necessary authority.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Document all vendors with whom PHI is shared in any form and have a Business Associate Agreement in place. Review the agreement annually.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">In conclusion, HIPAA law if not carefully complied with can cost the business fines upon fines. It is therefore important to have a solid HIPAA compliance system and to promptly notify the relevant body should any breach occur. If you already have a good and effective data security policy you are well on your way to complying with HIPAA laws and policies.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>HIPAA is a complex law. It can often become a challenge knowing where to begin as it does not provide a clear standard for compliance&#8230;.<\/p>\n","protected":false},"author":2,"featured_media":505,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[3],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.4.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>HIPAA Compliance for Businesses | HarmonizeHQ<\/title>\n<meta name=\"description\" content=\"HIPAA compliance is different for different organizations. This blog will guide you and help you stay compliant with HIPAA law.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.harmonizehq.com\/blog\/hipaa-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HIPAA Compliance for Businesses | HarmonizeHQ\" \/>\n<meta property=\"og:description\" content=\"HIPAA compliance is different for different organizations. This blog will guide you and help you stay compliant with HIPAA law.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.harmonizehq.com\/blog\/hipaa-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"Harmonize | Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-06T14:25:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-08T05:53:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.harmonizehq.com\/wp-content\/uploads\/HIPPA-Compliance-Featured-Image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.harmonizehq.com\/blog\/#website\",\"url\":\"https:\/\/www.harmonizehq.com\/blog\/\",\"name\":\"Harmonize | Blog\",\"description\":\"All Things HR\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.harmonizehq.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.harmonizehq.com\/blog\/hipaa-compliance\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/blog.harmonizehq.com\/wp-content\/uploads\/HIPPA-Compliance-Featured-Image.jpg\",\"contentUrl\":\"https:\/\/blog.harmonizehq.com\/wp-content\/uploads\/HIPPA-Compliance-Featured-Image.jpg\",\"width\":1280,\"height\":853,\"caption\":\"HIPPA Compliance Featured Image\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.harmonizehq.com\/blog\/hipaa-compliance\/#webpage\",\"url\":\"https:\/\/www.harmonizehq.com\/blog\/hipaa-compliance\/\",\"name\":\"HIPAA Compliance for Businesses | HarmonizeHQ\",\"isPartOf\":{\"@id\":\"https:\/\/www.harmonizehq.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.harmonizehq.com\/blog\/hipaa-compliance\/#primaryimage\"},\"datePublished\":\"2021-05-06T14:25:21+00:00\",\"dateModified\":\"2021-06-08T05:53:17+00:00\",\"author\":{\"@id\":\"https:\/\/www.harmonizehq.com\/blog\/#\/schema\/person\/3715fd9ea2cd87fea82eee5a5ddfd297\"},\"description\":\"HIPAA compliance is different for different organizations. This blog will guide you and help you stay compliant with HIPAA law.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.harmonizehq.com\/blog\/hipaa-compliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.harmonizehq.com\/blog\/hipaa-compliance\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.harmonizehq.com\/blog\/hipaa-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.harmonizehq.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HIPAA Compliance for Businesses\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.harmonizehq.com\/blog\/#\/schema\/person\/3715fd9ea2cd87fea82eee5a5ddfd297\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.harmonizehq.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/06a378c2b7451c6e70f3dff7caf1bbe6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/06a378c2b7451c6e70f3dff7caf1bbe6?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\/\/www.harmonizehq.com\/blog\/author\/author\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"HIPAA Compliance for Businesses | HarmonizeHQ","description":"HIPAA compliance is different for different organizations. This blog will guide you and help you stay compliant with HIPAA law.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.harmonizehq.com\/blog\/hipaa-compliance\/","og_locale":"en_US","og_type":"article","og_title":"HIPAA Compliance for Businesses | HarmonizeHQ","og_description":"HIPAA compliance is different for different organizations. This blog will guide you and help you stay compliant with HIPAA law.","og_url":"https:\/\/www.harmonizehq.com\/blog\/hipaa-compliance\/","og_site_name":"Harmonize | Blog","article_published_time":"2021-05-06T14:25:21+00:00","article_modified_time":"2021-06-08T05:53:17+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/blog.harmonizehq.com\/wp-content\/uploads\/HIPPA-Compliance-Featured-Image.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Author","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.harmonizehq.com\/blog\/#website","url":"https:\/\/www.harmonizehq.com\/blog\/","name":"Harmonize | Blog","description":"All Things HR","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.harmonizehq.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.harmonizehq.com\/blog\/hipaa-compliance\/#primaryimage","inLanguage":"en-US","url":"https:\/\/blog.harmonizehq.com\/wp-content\/uploads\/HIPPA-Compliance-Featured-Image.jpg","contentUrl":"https:\/\/blog.harmonizehq.com\/wp-content\/uploads\/HIPPA-Compliance-Featured-Image.jpg","width":1280,"height":853,"caption":"HIPPA Compliance Featured Image"},{"@type":"WebPage","@id":"https:\/\/www.harmonizehq.com\/blog\/hipaa-compliance\/#webpage","url":"https:\/\/www.harmonizehq.com\/blog\/hipaa-compliance\/","name":"HIPAA Compliance for Businesses | HarmonizeHQ","isPartOf":{"@id":"https:\/\/www.harmonizehq.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.harmonizehq.com\/blog\/hipaa-compliance\/#primaryimage"},"datePublished":"2021-05-06T14:25:21+00:00","dateModified":"2021-06-08T05:53:17+00:00","author":{"@id":"https:\/\/www.harmonizehq.com\/blog\/#\/schema\/person\/3715fd9ea2cd87fea82eee5a5ddfd297"},"description":"HIPAA compliance is different for different organizations. This blog will guide you and help you stay compliant with HIPAA law.","breadcrumb":{"@id":"https:\/\/www.harmonizehq.com\/blog\/hipaa-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.harmonizehq.com\/blog\/hipaa-compliance\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.harmonizehq.com\/blog\/hipaa-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.harmonizehq.com\/blog\/"},{"@type":"ListItem","position":2,"name":"HIPAA Compliance for Businesses"}]},{"@type":"Person","@id":"https:\/\/www.harmonizehq.com\/blog\/#\/schema\/person\/3715fd9ea2cd87fea82eee5a5ddfd297","name":"Author","image":{"@type":"ImageObject","@id":"https:\/\/www.harmonizehq.com\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/06a378c2b7451c6e70f3dff7caf1bbe6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/06a378c2b7451c6e70f3dff7caf1bbe6?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.harmonizehq.com\/blog\/author\/author\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.harmonizehq.com\/blog\/wp-json\/wp\/v2\/posts\/504"}],"collection":[{"href":"https:\/\/www.harmonizehq.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.harmonizehq.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.harmonizehq.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.harmonizehq.com\/blog\/wp-json\/wp\/v2\/comments?post=504"}],"version-history":[{"count":1,"href":"https:\/\/www.harmonizehq.com\/blog\/wp-json\/wp\/v2\/posts\/504\/revisions"}],"predecessor-version":[{"id":508,"href":"https:\/\/www.harmonizehq.com\/blog\/wp-json\/wp\/v2\/posts\/504\/revisions\/508"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.harmonizehq.com\/blog\/wp-json\/wp\/v2\/media\/505"}],"wp:attachment":[{"href":"https:\/\/www.harmonizehq.com\/blog\/wp-json\/wp\/v2\/media?parent=504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.harmonizehq.com\/blog\/wp-json\/wp\/v2\/categories?post=504"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.harmonizehq.com\/blog\/wp-json\/wp\/v2\/tags?post=504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}