Image of scale for blog about What is ECCS?

2 min read

What is ECCS?

Ethical compliance and conduct standards (ECCS) outline acceptable behaviors and practices for staff. An International Journal of Research in Education and Sustainable Development study notes, “A well-documented ethical compliance policy will help...

Read More
Image of data network for blog about What is the ethical management of PHI?

2 min read

What is the ethical management of PHI?

A Journal of Cybersecurity and Privacy states, “Ethics in data management can be defined as the principles and practices that guide the responsible...

Read More
email icon surrounded by people icons

2 min read

The shift from traditional HIPAA compliance training methods

Traditional compliance training methods have been characterized by their reliance on passive learning techniques like lengthy lectures, PowerPoint...

Read More
digtal smokestacks with overlaying data

3 min read

The environmental impact of using AI

As the popularity of AI technology grows, the computational power required to train and run AI models has surged. The result is an increased pressure...

Read More
floating digital healthcare icons

2 min read

How outsourcing healthcare services could lead to HIPAA violations

Organizations may choose to outsource for several reasons, including the need to reduce costs, access specialized skills, and improve scalability in...

Read More
digital documents and globe in blue

2 min read

Mechanisms to authenticate electronic protected health information

According to Section 164.312 (c )(2) of the Security Rule’s Technical Safeguards, “Mechanism to authenticate electronic protected health information...

Read More
provider pointing at clipboard with pen

2 min read

Implementation specifications group health plans must abide by

According to the Journal of Occupational and Environmental Medicine, “Under HIPAA, ‘a group health plan, and a health insurance issuer offering group...

Read More
Image of school for blog about PowerSchool data breach raises alarms over student medical privacy

1 min read

PowerSchool data breach raises alarms over student medical privacy

A major education software platform in North America, PowerSchool, experienced a confirmed cyberattack impacting the data of students and teachers.

Read More
Image of someone holding things, like a magnifying glass, to represent data for blog about What are integrity controls? 

1 min read

What are integrity controls? 

According to the Department of Health and Human Services (HHS), integrity means that data has not been altered or destroyed unless unauthorized. A...

Read More
Image of someone on a computer for blog about Understanding anti-malware protection

2 min read

Understanding anti-malware protection

With the prevalence of cyber threats, anti-malware protections serve as a frontline defense against malicious software that can disrupt services....

Read More
Image of laptop for blog about What are technology-neutral standards? 

1 min read

What are technology-neutral standards? 

The HHS Security Series notes, “When the final Security Rule was published, the security standards were designed to be “technology neutral” to...

Read More
Image of power lines for blog about How does an emergency access procedure work?

2 min read

How does an emergency access procedure work?

Emergency access procedures are protocols that take place during unforeseen circumstances threatening the availability of electronic protected health...

Read More
stethoscope on files

1 min read

Las Palmas Del Sol Healthcare faces insider data breach

Las Palmas Del Sol Healthcare in El Paso, Texas, has disclosed an insider data breach involving a former employee's unauthorized access to patient...

Read More