Image of family and stethoscope for article about What you need to know about sharing PHI with family

5 min read

What you need to know about sharing PHI with family

Healthcare organizations must ensure HIPAA compliant communication with family members and caregivers to protect patient privacy, avoid unauthorized disclosures, and maintain legal compliance. Organizations must obtain patient consent, limit sharing...

Read More
Image of someone typing for article on Are email aliases HIPAA compliant

2 min read

Are email aliases HIPAA compliant

Email aliases can be HIPAA compliant with proper security measures, like encryption, having a business associate agreement (BAA) with the email...

Read More
Image of email icons for blog about What happens when your email provider experiences a data breach

3 min read

What happens when your email provider experiences a breach

Email attacks are responsible for 18.1% of healthcare breaches. When your email provider experiences a data breach involving protected health...

Read More
Image of puzzle for blog about Is emailing about a colleague's medical condition a HIPAA violation?

2 min read

Is emailing about a colleague's medical condition a HIPAA violation?

Emailing about a colleague's medical condition is a HIPAA violation. Medical information about a colleague is considered protected health information...

Read More
laptop with floating data for post Healthcare breach roundup: Week of 9/30/24

2 min read

Healthcare breach roundup: Week of 9/30/24

Healthcare data breaches expose sensitive information of patients and clients. Despite advances in cybersecurity, healthcare organizations remain...

Read More
Image of individual typing with an email icon for blog about What to do when patient emails contain too much PHI

3 min read

What to do when patient emails contain too much PHI

If emails from patients contain too much PHI, acknowledge the email securely using a HIPAA compliant system, avoid replying with additional sensitive...

Read More
Image of someone on computer for blog about Online mental health intake forms and HIPAA

3 min read

Online mental health intake forms and HIPAA

Your mental health intake forms meet HIPAA standards when they ensure the protection of patient data through encryption, collect only the minimum...

Read More
Image of doctor checking the pulse of a patient for a blog about HIPAA compliance risks during mass health screenings

2 min read

HIPAA compliance risks during mass health screenings

The main HIPAA risks during mass health screenings include lack of privacy in screening areas, improper handling of paper or digital records,...

Read More
Image of someone's back facing the viewer for a blog about DDos attacks and their impact on HIPAA compliance

2 min read

DDos attacks and their impact on HIPAA compliance

A distributed denial-of-service (DDoS) attack impacts HIPAA compliance by disrupting the availability of protected health information (PHI), a...

Read More
Image of shield for blog about Summary of the CISA FOCAL plan

2 min read

Summary of the CISA FOCAL plan

CISA released the Federal Civilian Executive Branch (FCEB) Operational Cybersecurity Alignment (FOCAL) Plan on September 16, 2024, to provide...

Read More
Image of someone texting for a blog about what is text bombing?

4 min read

What is text bombing?

Text bombing is a type of cyber harassment where someone sends a large number of unsolicited text messages to a target's phone in a short period....

Read More
Graphic of multiple envelopes for a blog about keeping auto-responses HIPAA compliant

2 min read

Keeping auto-responses HIPAA compliant

Healthcare organizations must ensure they do not share protected health information (PHI) in automatic reply messages to comply with HIPAA...

Read More
Is it against HIPAA to give results over the phone?

2 min read

Is it against HIPAA to give results over the phone?

No, it is not necessarily against HIPAA to give results over the phone. Still, it requires careful adherence to specific guidelines. Healthcare...

Read More