More Articles

10 Myths of Security Risk Analysis Debunked

The HIPAA Security Rule requires organizations subject to HIPAA to conduct a Security Risk Analysis (SRA) to identify, address and mitigate risks to protected health information (PHI). The Office of… Read More

Unauthorized Disclosures, MGMA and Kathryn Ayers Wickenhauser

One of the inevitable demons in healthcare is that of accidental disclosure of protected health information (PHI). There is a solid risk that your healthcare organization has already experienced this… Read More

HIPAA and Harvey: Prepare for When Disaster Strikes

HIPAA requires Covered Entities (CEs) and Business Associates (BAs) protect patient privacy and follow a specific set of standards to disclose protected health information (PHI). But what happens in an… Read More

How Much Could One Data Breach Cost Your Organization?

In light of the recent Equifax data breach which has effected roughly 143 million Americans, protecting personal information has come to the forefront of thought for many people in the… Read More

The Importance of Being Intrapreneurial

As we continue our core value series, we come to one that may be the most unique – and important. “Be Intrapreneurial” is DataFile’s third and final core value. No,… Read More

Staffing Hourly Healthcare Employees: Is It Worth the Investment?

Staffing hourly employees in the healthcare environment is the industry norm – but there’s nothing “normal” about it. Some days are an adventure, and other days seem like a soap… Read More