Image of stethescope and clipboard for blog about What to know about the changes to the HIPAA Security Rule 

1 min read

What to know about the changes to the HIPAA Security Rule 

The Office for Civil Rights (OCR) has announced significant changes to the HIPAA Security Rule, marking the first major update since 2013. These changes introduce new requirements that will affect how healthcare organizations implement and maintain...

Read More
Image of puzzle for blog about Who is responsible for ensuring the BAA is in place?

2 min read

Who is responsible for ensuring the BAA is in place?

The covered entity is responsible for ensuring that a business associate agreement (BAA) is in place with any business associate who has access to...

Read More
Image of two individuals shaking hands for blog about Reviewing your BAA

2 min read

Reviewing your BAA

Reviewing a business associate agreement (BAA) involves ensuring the agreement continues to comply with the Health Insurance Portability and...

Read More
Image of someone on a computer for blog about What is digital health literacy? 

1 min read

What is digital health literacy?

Digital health literacy is being able to seek, find, understand, and apply health information from electronic sources to address health-related...

Read More
Image of key for blog about What is the Triple Data Encryption Standard?

2 min read

What is the Triple Data Encryption Standard?

The National Institute of Standards and Technology defines the Triple Data Encryption Standard (3DES) as a technique and algorithm used to secure...

Read More
youmail logo

1 min read

Is YouMail HIPAA compliant? (2025 update)

Based on our research, YouMail is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...

Read More
iterable logo

1 min read

Is Iterable HIPAA compliant? (2025 update)

Based on our research, Iterable is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS) to...

Read More
Image of pharmacy for blog about What is supply chain transparency? 

2 min read

What is supply chain transparency? 

Supply chain transparency is the practice of providing clear, accessible information about the different stages involved in the production and...

Read More
Image of data for blog about Understanding unreadable data in cybersecurity

2 min read

Understanding unreadable data in cybersecurity

Making data unreadable, especially to unauthorized users, is required to protect sensitive information from breaches and misuse. This term refers to...

Read More
Image of someone on their phone for blog about Protecting patient privacy on social media 

2 min read

Protecting patient privacy on social media

Healthcare professionals must exercise extreme caution when using social media, as improper postings can lead to serious breaches of patient trust,...

Read More
Image of phone with cloud of data for blog about Texas sues Allstate over illegally selling 45 million Americans' data

2 min read

Texas sues Allstate over illegally selling 45 million Americans' data

Texas has sued Allstate and its subsidiary Arity, accusing them of illegally collecting and selling the personal data of over 45 million Americans...

Read More
Image of data breach notice for blog about Hidden notification of the Change Healthcare data breach

2 min read

Hidden notification of the Change Healthcare data breach

The Change Healthcare data breach has raised concerns after the company posted its breach notification online but hid it from search engines, making...

Read More
Image of paper cut outs of individuals for blog about How HIPAA compliant email benefits online cancer support groups 

2 min read

How HIPAA compliant email benefits online cancer support groups

HIPAA compliant email provides a platform for members of support groups to connect and share their experiences. These support groups can provide...

Read More