1 min read
HIPAA compliance for e-visits
Yes, e-visits must be HIPAA compliant if they involve the exchange of protected health information (PHI) between a patient and a covered entity.
Read More1 min read
Yes, e-visits must be HIPAA compliant if they involve the exchange of protected health information (PHI) between a patient and a covered entity.
Read More1 min read
Based on our research, HubSpot is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...
1 min read
Based on our research, Sonic email is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...
1 min read
Based on our research, Citrix Sharefile is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services...
1 min read
Healthcare data analytics companies can be considered business associates under HIPAA, but it depends on the nature of their work and their...
2 min read
To determine if your services are covered by HIPAA, you need to identify if your organization falls under the category of a "covered entity" or if...
1 min read
Berry, Dunn, McNeil & Parker and Reliable Networks have reached a $7.25 million settlement to resolve claims that they failed to protect consumers...
1 min read
Access controls are a security mechanism that regulates who or what can view, use, or modify resources in a system. They ensure only authorized...
1 min read
Based on our research, AtData is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...
1 min read
Based on our research, JangoMail is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...
2 min read
Apple has issued an urgent security update after discovering that some iPhones and iPads have been targeted by a highly sophisticated attack.
2 min read
Ensuring HIPAA compliance in communication is a critical responsibility for healthcare organizations, business associates, and any entity handling...
1 min read
A security assessment is a systematic evaluation of an organization's information systems, policies, and infrastructure to identify vulnerabilities,...