1 min read
HIPAA compliance for e-visits
Yes, e-visits must be HIPAA compliant if they involve the exchange of protected health information (PHI) between a patient and a covered entity.
Read More
1 min read
Yes, e-visits must be HIPAA compliant if they involve the exchange of protected health information (PHI) between a patient and a covered entity.
Read More
1 min read
Based on our research, HubSpot is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...
1 min read
Based on our research, Sonic email is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...
1 min read
Based on our research, Citrix Sharefile is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services...
1 min read
Healthcare data analytics companies can be considered business associates under HIPAA, but it depends on the nature of their work and their...
2 min read
To determine if your services are covered by HIPAA, you need to identify if your organization falls under the category of a "covered entity" or if...
1 min read
Berry, Dunn, McNeil & Parker and Reliable Networks have reached a $7.25 million settlement to resolve claims that they failed to protect consumers...
1 min read
Access controls are a security mechanism that regulates who or what can view, use, or modify resources in a system. They ensure only authorized...
1 min read
Based on our research, AtData is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...
1 min read
Based on our research, JangoMail is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...
2 min read
Apple has issued an urgent security update after discovering that some iPhones and iPads have been targeted by a highly sophisticated attack.
2 min read
Ensuring HIPAA compliance in communication is a critical responsibility for healthcare organizations, business associates, and any entity handling...
1 min read
A security assessment is a systematic evaluation of an organization's information systems, policies, and infrastructure to identify vulnerabilities,...