woman holding smartphone

3 min read

Why HIPAA doesn’t cover period tracking apps

Most period-tracking apps are not directly associated with a healthcare provider or covered entity. They typically collect data for consumer use rather than for healthcare treatment, billing, or operational purposes and, therefore, don’t fall under...

Read More
Image of file folders for blog about Should business associates provide individuals with an accounting of disclosures?

2 min read

Should business associates provide an accounting of disclosures?

The HIPAA Privacy Rule does not require business associates to provide individuals with an accounting of disclosures. This responsibility falls...

Read More
Image of checklist for blog about Preparing for a cyberattack

2 min read

Preparing for a cyberattack

A single breach can lead to significant financial losses, damage to reputation, and legal liabilities. Fortunately, proactive planning and robust...

Read More
Image of a computer with Google open for blog about Can mental health professionals google their patients?

3 min read

Can mental health professionals google their patients?

Mental health professionals, like all healthcare providers, must comply with the Health Insurance Portability and Accountability Act (HIPAA), which...

Read More
Image of hooded figure on a computer for blog about Ransomware group demands baguettes from Schneider Electric

3 min read

Ransomware group demands baguettes from Schneider Electric

Schneider Electric is investigating a ransomware attack claimed by the Hellcat group. The group is demanding $125,000 in baguettes and threatening to...

Read More
Image of someone signing a document for blog about Can business associates amend PHI?

2 min read

Can business associates amend PHI?

Business associates do not have the authority to grant individuals the opportunity to amend their PHI. Patients must submit amendment requests to the...

Read More
Image of handcuffs for blog about Learning from the arrest in the Snowflake data breach

2 min read

Learning from the arrest in the Snowflake data breach

Canadian law enforcement authorities recently apprehended Alexander Moucka, also known by the online aliases Judische and Waifu, in connection with a...

Read More
Image of files for blog about Should business associates give individuals access to their PHI?

2 min read

Should business associates give individuals access to their PHI?

Business associates are not required to give individuals direct access to their protected health information (PHI). However, they must assist the...

Read More
face in digital security blue for post DHS and CISA outline post-quantum security steps for operational technology 

3 min read

DHS and CISA outline post-quantum security steps for operational technology 

The US Department of Homeland Security (DHS) and the Cybersecurity and Infrastructure Security Agency (CISA) have released guidance to help operators...

Read More
Image of a lock on a keyboard for article about Canadian authorities arrest suspected hacker linked to Snowflake data breach

2 min read

Canadian authorities arrest suspected hacker linked to Snowflake data breach

Canadian law enforcement has arrested Alexander Moucka, a suspect in a significant cyberattack that compromised the data of numerous Snowflake...

Read More
donating blood for post Are blood banks bound by HIPAA?

2 min read

Are blood banks bound by HIPAA?

Blood banks are generally not bound by HIPAA, but they adhere to FDA regulations, state privacy laws, and their own confidentiality policies to...

Read More
Image of someone signing a document online for blog about Do electronic BAAs meet HIPAA Privacy Rule requirements?

2 min read

Do electronic BAAs meet HIPAA Privacy Rule requirements?

Electronic business associate agreements (BAAs), signed with an electronic signature, are permissible under the HIPAA Privacy Rule if they meet all...

Read More
Image of lock for blog about What are cybersecurity performance goals (CPGs)?

2 min read

What are cybersecurity performance goals (CPGs)?

Cybersecurity performance goals (CPGs) are a set of cybersecurity best practices and minimum-security standards developed by the Cybersecurity and...

Read More