2 min read
How to handle sensitive data
Properly handling sensitive data, especially in healthcare, is required for maintaining privacy, security, and regulatory compliance.
Read More
2 min read
Properly handling sensitive data, especially in healthcare, is required for maintaining privacy, security, and regulatory compliance.
Read More
1 min read
A federal judge has dismissed charges against Dr. Eithan Haim, who was accused of violating HIPAA by leaking private patient information from Texas...
1 min read
Based on our research, eFax is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS) to...
1 min read
Based on our research, Optimove is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS) to...
1 min read
Based on our research, Woopra is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...
2 min read
Today's healthcare environment is predominantly digital and can hold many cyber threats, making safeguarding patient information and complying with...
2 min read
The data lifecycle refers to the series of stages that data goes through from its creation to its eventual deletion.
1 min read
Based on our research, GetResponse is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...
1 min read
Based on our research, Notion is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS) to...
1 min read
Based on our research, CarrierZone is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...
1 min read
The Office for Civil Rights (OCR) has announced significant changes to the HIPAA Security Rule, marking the first major update since 2013. These...
2 min read
The National Institute of Standards and Technology defines the Triple Data Encryption Standard (3DES) as a technique and algorithm used to secure...
2 min read
Making data unreadable, especially to unauthorized users, is required to protect sensitive information from breaches and misuse. This term refers to...