Category Archives for Blog

Avoiding the HIPAA Wall of Shame

Security Tips for Protecting Your HIPAA Compliant DataThe consequences of violating HIPAA can be extreme. Limitless monetary fines and a crippled reputation can destroy an organization. Even if you don’t lose everything after a HIPAA data breach, you can find yourself forever on the HIPAA Wall of Shame. The Health Insurance Portability and Accountability Act (HIPAA) […]

How to Ensure HIPAA Compliance Efforts Focus on Data Security

HIPAA, the Health Insurance Portability and Accountability Act, was created with the goal of modernizing and securing the flow of healthcare information, and has two major sets of rules: HIPAA Privacy Rules that ensure the protection of the patient’s medical data confidentiality, and HIPAA Security Rules that ensure the security, confidentiality, and availability of medical […]

Can Wearables Be HIPAA Compliant?

Approved in 1996, the Health Insurance Portability and Accountability Act (HIPAA) establishes a set of rules within the United States for the protection of certain health information. HIPAA establishes and enforces safety and privacy standards for healthcare organizations such as pharmacies, hospitals, and health plans on patient data. This law has also been amended to […]

HIPAA-Compliant Web Hosting: Questions to Ask When Looking for a Provider

If your organization deals with electronic protected health information (ePHI), it needs to be using a HIPAA-compliant web hosting provider to keep its data safe and comply with HIPAA regulations. This applies to both healthcare providers and any business associates that are involved in processing, storing, or transmitting data.Finding the right provider can be a […]

HIPAA-Compliant Email: Questions to Ask When Looking for a Provider

If your business operates in the healthcare sector or works with businesses that do, it may be dealing with electronic protected health information (ePHI). This is individually identifiable data that relates to the healthcare of patients, and it needs to be protected according to HIPAA regulations.If your business transmits ePHI by email, then it must […]

1 2 3 5