Providing Accounting Services to Health Care Providers
The HITECH Act requires business associates to use or disclose protected health information as obligated under its associate agreement with a covered entity
Published on March 06, 2013
2008 TTI Case Study Securing Our Nations Systems
Scott Cytron interviews Lisa Johnson on the Top Technology Initiatives list.
Published on February 19, 2013
Health Insurance Portability and Accountability Act (HIPAA)
The Health Insurance Portability and Accountability Act (HIPAA) was passed by Congress on August 21, 1996. The law requires any health care provider to meet certain privacy standards with respect to personal health information
Published on April 27, 2010
Service Organization Control Reporting
Today, it is common for entities to outsource business tasks or functions to service organizations, even those that are core to an entity’s operations. Although user entities may rely on a service organization to perform outsourced tasks or functions, the user entity still retains responsibility (and the risks associated) for
Published on June 25, 2014
Statement on Auditing Standards
These AICPA IMTA resources help support CPAs in achieving a level of quality when providing assurance services.
Published on April 10, 2013
Sample Employee Privacy Notice
Published on March 12, 2013
Internal Revenue Code
IRC Section 7216 prohibits anyone who is involved in the preparation of tax returns from knowingly or recklessly disclosing or using tax-related information.
Published on March 07, 2013
Federal, State and Other Professional Regulations
CPAs engaged to perform privacy advisory services and attestation engagements must follow the pertinent, laws, rules, and standards.
Published on March 08, 2013
Archived IMTA Division Webcasts
Our highly rated webcasts gives the IMTA Division the opportunity to learn about timely issues as well as interact with their fellow peers.
Published on July 28, 2014
Critical Security Audit Considerations
This article will address specific policies, procedures, and methods related to the security portion of an information technology internal audit.
Published on February 25, 2013