Category Archives for Blog

Avoiding the HIPAA Wall of Shame

Security Tips for Protecting Your HIPAA Compliant DataThe consequences of violating HIPAA can be extreme. Limitless monetary fines and a crippled reputation can destroy an organization. Even if you don’t lose everything after a HIPAA data breach, you can find yourself forever on the HIPAA Wall of Shame. The Health Insurance Portability and Accountability Act (HIPAA) […]

How to Ensure HIPAA Compliance Efforts Focus on Data Security

There is little that is more disruptive and detrimental to a healthcare organization than a HIPAA violation. First, consider the penalties. The HHS Office for Civil Rights (OCR) issues fines of $50,000 per violation up to a $1.5 million maximum, and criminal penalties can be up to ten years imprisonment and $250,000 in fines. Second, […]

Can Wearables Be HIPAA Compliant?

There is little that is more disruptive and detrimental to a healthcare organization than a HIPAA violation. First, consider the penalties. The HHS Office for Civil Rights (OCR) issues fines of $50,000 per violation up to a $1.5 million maximum, and criminal penalties can be up to ten years imprisonment and $250,000 in fines. Second, […]

HIPAA-Compliant Web Hosting: Questions to Ask When Looking for a Provider

If your organization deals with electronic protected health information (ePHI), it needs to be using a HIPAA-compliant web hosting provider to keep its data safe and comply with HIPAA regulations. This applies to both healthcare providers and any business associates that are involved in processing, storing, or transmitting data.Finding the right provider can be a […]

HIPAA-Compliant Email: Questions to Ask When Looking for a Provider

If your business operates in the healthcare sector or works with businesses that do, it may be dealing with electronic protected health information (ePHI). This is individually identifiable data that relates to the healthcare of patients, and it needs to be protected according to HIPAA regulations.If your business transmits ePHI by email, then it must […]