Personal Information
Organization / Workplace
Brentwood, TN United States
Occupation
Executive
Industry
Technology / Software / Internet
Website
About
Mr. Chaput is president of Clearwater Compliance LLC. Clearwater Compliance helps Covered Entities and Business Associates meet stringent HIPAA-HITECH Security Rule requirements and address one of five health outcomes policy priorities in the Meaningful Use Stage 1 guidelines dealing with privacy and security. Over the past 30 years, Bob has worked as an educator, an executive and an entrepreneur. He has assisted businesses and individuals in developing highly secure information technology (IT) strategies that are tightly linked with their business strategies and goals. His workshops, seminars, writings and consultations reflect his knowledge, humor, enthusiasm and vision.
Bob is no st
Tags
hipaa
hitech
hipaa security
hipaa compliance
compliance
hipaa privacy
hipaa security assessment
hipaa compliance software
risk analysis
hitech act
webinars
security
privacy
hipaa policies and procedures
clearwater compliance
hipaa law
hipaa software
hipaa risk analysis
hipaa risk assessment
kpmg
evaluation
bob chaput
breach notification
ocr audits
ocr
hipaa security risk analysis
hipaa audit
ansi
hipaa security standards
hipaa-hitech
hipaa security requirements
kpmg audit
ocr audit
encryption
data breach
violations
enforcement
risk assessment
live web events
hipaa-hitech compliance
hipaa hitech compliance webinars
hipaa security final rule
hipaa security policy and procedure templates
hipaa security policy templates
hipaa-hitech webinars
hipaa security policies
hipaa laws
meaningful use
hitech compliance
hipaa security standard
second-in-command
presidents
coo forum
expert
ephi
phi
jim mathis
bob chapiut
adam greene
breach costs
phi project
cost of breach
data breach costs
live webinars
audits
hipaa policies
hipaa. hitech
security assessment
performance audit
ocr audit protocols
cms meaningful use audits
house bill 300
hipaa-hitech 101
hipaa texas style
peer group interaction
electronic phi ephi
discovery of a breach
breach notification interim final rule
secured phi
protected health information phi
harm standard
unsecured phi
personally identifiable information pii
breach
harm
chain of custody
hipaa tools
hipaa violations
hipaa compliane
security policies and procedures
hipaa enforcement
security evaluation
hipaa procedures
hipaa audits
cissp
hipaa training
See more