enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Health Insurance Portability and Accountability Act - Wikipedia

    en.wikipedia.org/wiki/Health_Insurance...

    Covered entities that outsource some of their business processes to a third party must ensure that their vendors also have a framework in place to comply with HIPAA requirements. Companies typically gain this assurance through contract clauses stating that the vendor will meet the same data protection requirements that apply to the covered entity.

  3. Protected health information - Wikipedia

    en.wikipedia.org/wiki/Protected_health_information

    Covered Entities often use third parties to provide certain health and business services. If they need to share PHI with those third parties, it is the responsibility of the Covered Entity to put in place a Business Associate Agreement that holds the third party to the same standards of privacy and confidentiality as the Covered Entity.

  4. 340B Drug Pricing Program - Wikipedia

    en.wikipedia.org/wiki/340B_Drug_Pricing_Program

    Once enrolled, covered entities are assigned a 340B identification number that vendors must verify before allowing an organization to purchase discounted drugs. Covered entities must complete the recertification process on the Office of Pharmacy Affairs (OPA) 340B database website every year.

  5. Joint Commission - Wikipedia

    en.wikipedia.org/wiki/Joint_Commission

    The Joint Commission is a United States-based nonprofit tax-exempt 501(c) organization [1] that accredits more than 22,000 US health care organizations and programs. [2] The international branch accredits medical services from around the world.

  6. Red Flags Rule - Wikipedia

    en.wikipedia.org/wiki/Red_Flags_Rule

    The Red Flags Rule sets out how certain businesses and organizations must develop, implement, and administer their Identity Theft Prevention Programs. The program must include four basic elements, which together create a framework to address the threat of identity theft. [9] [10] The program has four elements: 1) Identify Relevant Red Flags

  7. Whistleblower protection in the United States - Wikipedia

    en.wikipedia.org/wiki/Whistleblower_protection...

    Ensure that managers have training in the management of a diverse workforce, early and alternative conflict resolution, and essential communications skills; Conduct studies on the trends and causes of complaints of discrimination; Implement new measures to improve the complaint process and the work environment

  8. SEC Office of the Whistleblower - Wikipedia

    en.wikipedia.org/wiki/SEC_Office_of_the...

    An SEC Office of the Whistleblower attorney, who conducts a full review of a covered action, generally communicates with whistleblowers who have submitted award applications under a covered action. A written notification of the claims review staff's preliminary determination and a whistleblower's rights in the awards claims process are sent to ...

  9. Auditor independence - Wikipedia

    en.wikipedia.org/wiki/Auditor_independence

    an entity whose operating, financial, or accounting policies can be controlled by any of the individuals or entities described in items a–e or two or more such individuals or entities if they act together.” Immediate family members of covered members (spouses, dependents) must comply with the same independence rules as the covered members.