• We are passionate compliance experts, determine to make a difference for our clients. JAL strives to provide the highest quality of comprehensive, affordable, and easy-to-use tools which cover every aspect of the compliance landscape. Each of JAL’s compliance solutions are customized, from policies to employee trainings.

    Judith, along with her advisors are valued and trusted partners. Consistently delivering objective informed advice, supplying actionable plans and tools for measuring success.  

  • Planning

    "a detailed scheme or method for accomplishment of an object."

    • Access the principles, practice and procedures
    • Execute Risk Gap Analysis

    • Prepare a narrative for all compliance threats

    • Develop and implement customized audits for each area of an operation handling sensitive data; Intake Matter- Billing- Medical Records- Human Resources- Clinics- Labs and more.

    • Create a Scope of Work identifying the key areas of risk which need to be addressed for achieving your regulatory compliance within:
      - Information Security Compliance Program
    • Create a Scope of Work identifying the key areas of risk which need to be addressed for achieving your regulatory compliance within:
      - Information Security Compliance Program
      - Health Insurance Portability and Accountability Act (HIPAA)
      - Office for Civil Rights
      - Gramm-Leach-Bliley Act (GLBA)
      - Federal Communication Commission-Major Cybersecurity Threats
      - National Information Infrastructure Protection Act of 1996
      - Fair Credit Reporting Act and the Fair and Accurate Credit Transactions Act
      - Payment Card Industry Data Security Standard (PCI-DSS)
      - Red Flag Rule
      - State information security breach notification laws.
      - State laws that regulate the collection, use and other processing of Social Security Number (SSN)

  • Strategy

    "a plan of action for policy designed to achieve a major or overall aim."

    • Gather critical data in order to establish or expand operational policies and procedures which are reasonable and appropriate

    • Identify foreseeable risks and recommend actions for mitigation

    • Collaboration with key members for launching for compliance program

    • Train, coach and mentor key members throughout implementation

  • Results Is the Name of the Game

    "to come about as a consequence."

    • Virtual Compliance Officer

    • Business Associate and Vendor Management

    • Customized Compliance Manual containing entity specific policies and procedures develop with your organization in mind  

    • Employee Handbook development and auditing

    • Customized Employee Training for Information Security Training and HIPAA Privacy available

    • Click here for a sample of the Medical Compliance Guide