Legal marijuana and HIPAA

3 min read

Legal marijuana and HIPAA

When the use of marijuana is prescribed or discussed by a healthcare provider, the information is protected under HIPAA.

Read More
What are blind signatures?

1 min read

What are blind signatures?

A blind signature is a cryptographic method that hides the content of a message while it is being signed. It’s often used when the sender wants to...

Read More
What is WAN optimization?

1 min read

What is WAN optimization?

WAN optimization improves data transfer processes by using various techniques including compression.

Read More
PHI sharing in multi-agency services collaboration

2 min read

PHI sharing in multi-agency services collaboration

Multi-agency services in healthcare bring together different health and social service experts to provide comprehensive care to patients. By working...

Read More
Barriers to mental healthcare in college students

3 min read

Barriers to mental healthcare in college students

Students in college frequently struggle with accessing mental healthcare due to the stigma, perceived barriers, and time constraints. However,...

Read More
Celebrating nearly three decades of protecting patient privacy.

2 min read

Celebrating nearly three decades of protecting patient privacy

The HHS celebrates 28 years of health data protection and advancement in patient privacy.

Read More
Securing patient data in digital consent forms

2 min read

Securing patient data in digital consent forms

Healthcare providers can secure patient data in digital consent forms using strong encryption, robust access controls, and secure storage with...

Read More
Including limited data sets in an account of disclosures

1 min read

Including limited data sets in an account of disclosures

Limited data sets are exempt from a patient's right to an accounting of disclosures.

Read More
Confidant Health's unsecured database unveiled by security researcher

1 min read

Confidant Health's unsecured database unveiled by security researcher

On September 6, 2024, Confidant Health’s unsecured database was discovered by a security researcher exposinghighly sensitive information that...

Read More
Planned parenthood becomes one of RansomHub's 200+ cyberattack victims

1 min read

Planned parenthood becomes one of RansomHub's 200+ cyberattack victims

Planned Parenthood has become the latest target in a recent ransomware attack in its Montana branch.

Read More
What is intent based networking?

1 min read

What is intent based networking?

Intent-based networking is a form of network management that uses machine learning and automation.

Read More
Helping loved ones cope with mental illness

2 min read

Helping loved ones cope with mental illness

Loved ones, like family, friends, and mentors, can provide stability and additional support to those facing mental health challenges. Healthcare...

Read More
Inventory optimization in healthcare practices

1 min read

Inventory optimization in healthcare practices

Inventory optimization is the strategic planning surrounding the management of medical supplies to minimize cost and waste.

Read More