Category Archives for Blog

How to Ensure HIPAA Compliance Efforts Focus on Data Security

HIPAA, the Health Insurance Portability and Accountability Act, was created with the goal of modernizing and securing the flow of healthcare information, and has two major sets of rules: HIPAA Privacy Rules that ensure the protection of the patient’s medical data confidentiality, and HIPAA Security Rules that ensure the security, confidentiality, and availability of medical […]

Can Wearables Be HIPAA Compliant?

Approved in 1996, the Health Insurance Portability and Accountability Act (HIPAA) establishes a set of rules within the United States for the protection of certain health information. HIPAA establishes and enforces safety and privacy standards for healthcare organizations such as pharmacies, hospitals, and health plans on patient data. This law has also been amended to […]

HIPAA-Compliant Web Hosting: Questions to Ask When Looking for a Provider

If your organization deals with electronic protected health information (ePHI), it needs to be using a HIPAA-compliant web hosting provider to keep its data safe and comply with HIPAA regulations. This applies to both healthcare providers and any business associates that are involved in processing, storing, or transmitting data.Finding the right provider can be a […]

HIPAA-Compliant Email: Questions to Ask When Looking for a Provider

If your business operates in the healthcare sector or works with businesses that do, it may be dealing with electronic protected health information (ePHI). This is individually identifiable data that relates to the healthcare of patients, and it needs to be protected according to HIPAA regulations.If your business transmits ePHI by email, then it must […]

What is HIPAA Compliant Secure Email?

When you want to harden your email security approach for compliance with the HIPAA Security Rule, a simple step is to protect your passwords. Consider using password software to auto-generate your passwords for complete randomization. Plus, you want to make sure to bolster your password protection with multi-factor authentication (MFA). You could experience spoofing of […]

1 2 3 5