2 min read
How to handle sensitive data
Properly handling sensitive data, especially in healthcare, is required for maintaining privacy, security, and regulatory compliance.
Read More2 min read
Properly handling sensitive data, especially in healthcare, is required for maintaining privacy, security, and regulatory compliance.
Read More1 min read
A federal judge has dismissed charges against Dr. Eithan Haim, who was accused of violating HIPAA by leaking private patient information from Texas...
1 min read
Based on our research, eFax is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS) to...
1 min read
Based on our research, Optimove is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS) to...
1 min read
Based on our research, Woopra is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...
2 min read
Today's healthcare environment is predominantly digital and can hold many cyber threats, making safeguarding patient information and complying with...
2 min read
The data lifecycle refers to the series of stages that data goes through from its creation to its eventual deletion.
1 min read
Based on our research, GetResponse is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...
1 min read
Based on our research, Notion is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS) to...
1 min read
Based on our research, CarrierZone is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...
1 min read
The Office for Civil Rights (OCR) has announced significant changes to the HIPAA Security Rule, marking the first major update since 2013. These...
2 min read
The National Institute of Standards and Technology defines the Triple Data Encryption Standard (3DES) as a technique and algorithm used to secure...
2 min read
Making data unreadable, especially to unauthorized users, is required to protect sensitive information from breaches and misuse. This term refers to...