Who should notify patients when a data breach happens?

2 min read

Who should notify patients when a data breach happens?

A covered entity should notify patients directly when a data breach involves their PHI.

Read More
What is charge capture?

2 min read

What is charge capture?

Charge capture is recording and submitting for reimbursement all medical procedures and services provided to a patient within the provider's care.

Read More
What is rate limiting?

1 min read

What is rate limiting?

Rate limiting controls the number of requests made from an API to promote fair access, and maintain peak performance.

Read More
Fortinet reports a limited data breach

1 min read

Fortinet reports a limited data breach

Fortinet has experienced a breach the company claims had minimal security implications.

Read More
Are cannabis dispensaries covered entities under HIPAA?

1 min read

Are cannabis dispensaries covered entities under HIPAA?

No, marijuana dispensaries are not covered entities.

Read More
United Way of Connecticut and UConn Health suffer data breaches

1 min read

United Way of Connecticut and UConn Health suffer data breaches

Two Connecticut healthcare providers recently experienced cyberattacks involving compromised email accounts.

Read More
Communicating beyond therapy sessions

1 min read

Communicating beyond therapy sessions

Communication outside the therapy room benefits mood monitoring by allowing real-time tracking of a patient's emotional state.

Read More
What are HIPAA's Other Arrangements?

3 min read

What are HIPAA's Other Arrangements?

Other Arrangements provide government entities with compliant pathways tailored to their specific needs, helping them fulfill their HIPAA obligations...

Read More
Legal marijuana and HIPAA

3 min read

Legal marijuana and HIPAA

When the use of marijuana is prescribed or discussed by a healthcare provider, the information is protected under HIPAA.

Read More
What are blind signatures?

1 min read

What are blind signatures?

A blind signature is a cryptographic method that hides the content of a message while it is being signed. It’s often used when the sender wants to...

Read More
What is WAN optimization?

1 min read

What is WAN optimization?

WAN optimization improves data transfer processes by using various techniques including compression.

Read More
PHI sharing in multi-agency services collaboration

2 min read

PHI sharing in multi-agency services collaboration

Multi-agency services in healthcare bring together different health and social service experts to provide comprehensive care to patients. By working...

Read More
Barriers to mental healthcare in college students

3 min read

Barriers to mental healthcare in college students

Students in college frequently struggle with accessing mental healthcare due to the stigma, perceived barriers, and time constraints. However,...

Read More