Image of digitalized globe, representing the internet for blog about What is the Internet of Medical Things (IOMT)

3 min read

What is the Internet of Medical Things (IOMT)

The Internet of Medical Things (IoMT) refers to a network of connected medical devices, applications, and systems that communicate data over the Internet. These devices monitor patients' health, collect clinical data, and deliver insights to...

Read More
Image of lock saying

3 min read

Orthopedics Rhode Island data breach exposes patient information

Orthopedics Rhode Island announced a data breach that compromised sensitive patient information, encompassing personal and medical details. They...

Read More
Image of two people discussing legal matters for blog about HIPAA compliance forms for social workers

2 min read

HIPAA compliance forms for social workers

Social workers must adhere to the Health Insurance Portability and Accountability Act (HIPAA), which mandates the protection of patient information...

Read More
Image of two people in therapy for blog about Must social workers comply with HIPAA regulations?

3 min read

Must social workers comply with HIPAA regulations?

The Health Insurance Portability and Accountability Act (HIPAA) of 1996 generated federal regulations that apply to healthcare professionals and...

Read More
Image of a computer log-in screen for blog about Automatic logout for HIPAA compliance

2 min read

Automatic logout for HIPAA compliance

As part of a broader security strategy, automatic logout helps healthcare providers protect sensitive information, reduce the risk of data breaches,...

Read More
woman holding smartphone with calendar app holding pill packet

3 min read

Viral warning about period-tracking apps raises privacy concerns

Most period-tracking apps are not covered by HIPAA, leaving user health data vulnerable to legal requests.

Read More
woman holding smartphone

3 min read

Why HIPAA doesn’t cover period tracking apps

Most period-tracking apps are not directly associated with a healthcare provider or covered entity. They typically collect data for consumer use...

Read More
Image of file folders for blog about Should business associates provide individuals with an accounting of disclosures?

2 min read

Should business associates provide an accounting of disclosures?

The HIPAA Privacy Rule does not require business associates to provide individuals with an accounting of disclosures. This responsibility falls...

Read More
Image of checklist for blog about Preparing for a cyberattack

2 min read

Preparing for a cyberattack

A single breach can lead to significant financial losses, damage to reputation, and legal liabilities. Fortunately, proactive planning and robust...

Read More
Image of a computer with Google open for blog about Can mental health professionals google their patients?

3 min read

Can mental health professionals google their patients?

Mental health professionals, like all healthcare providers, must comply with the Health Insurance Portability and Accountability Act (HIPAA), which...

Read More
Image of hooded figure on a computer for blog about Ransomware group demands baguettes from Schneider Electric

3 min read

Ransomware group demands baguettes from Schneider Electric

Schneider Electric is investigating a ransomware attack claimed by the Hellcat group. The group is demanding $125,000 in baguettes and threatening to...

Read More
Image of someone signing a document for blog about Can business associates amend PHI?

2 min read

Can business associates amend PHI?

Business associates do not have the authority to grant individuals the opportunity to amend their PHI. Patients must submit amendment requests to the...

Read More
Image of handcuffs for blog about Learning from the arrest in the Snowflake data breach

2 min read

Learning from the arrest in the Snowflake data breach

Canadian law enforcement authorities recently apprehended Alexander Moucka, also known by the online aliases Judische and Waifu, in connection with a...

Read More