digital security shield

2 min read

Developing a HIPAA security program

A HIPAA security program is a comprehensive set of policies, procedures, and technical measures implemented by healthcare organizations to protect electronic protected health information (PHI) in compliance with the HIPAA Security Rule. Healthcare...

Read More
Image of different types of data, including health, for blog about What are de-identification forms?

2 min read

What are de-identification forms?

De-identification forms are documents or templates used to ensure that sensitive information, particularly personally identifiable information (PII)...

Read More
Image of police badge for blog about When does the Privacy Rule allow covered entities to disclose PHI to law enforcement? 

2 min read

When does the Privacy Rule let covered entities disclose PHI to law enforcement? 

The HIPAA Privacy Rule permits PHI disclosure to law enforcement without patient authorization in specific situations, like complying with court...

Read More
Image of computer for blog about HIPAA compliant computer disposal 

3 min read

HIPAA compliant computer disposal

The HIPAA privacy rule requires healthcare entities to create and follow policies for safely disposing of protected health information (PHI),...

Read More
Image of someone holding tickets for blog about What is a golden ticket attack?

3 min read

What is a golden ticket attack?

Golden ticket attacks are when criminals infiltrate the Kerberos authentication system. They are a serious cybersecurity threat, especially for...

Read More
Image of tax forms for blog about Understanding Title V of HIPAA

2 min read

Understanding Title V of HIPAA

Title V of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) focuses on revenue offsets to address specific tax-related...

Read More
law gavel on us flag

2 min read

What are the primary forms of preemption?

Preemption is a principle that promotes a uniform legal framework across states, particularly in areas where federal regulation is needed to address...

Read More
ascension logo

1 min read

Ascension cyberattack exposes 5.6 million

On May 8, 2024, healthcare giant Ascension experienced a cyberattack that compromised the protected health information (PHI) of nearly 5.6 million...

Read More
university of southwestern texas exterior building

2 min read

University of Texas Southwestern files 3rd data breach notice of 2024

The medical center has filed another breach to the Department of Health and Human Services (HHS).

Read More
amergis logo

2 min read

Amergis Healthcare breach impacts 11,000

The Maryland-based healthcare staffing firm has begun sending out breach notification letters.

Read More
broken lock with medical symbol

1 min read

Richmond University Medical Center faces data breach

The Medical Center recently notified the Attorney General of Maine and patients regarding a data breach.

Read More
empty hospital bed

2 min read

Can covered entities share information with family members after a death?

“The Privacy Rule permits a covered entity to disclose protected health information about a decedent to a family member, or other person who was...

Read More
data on laptop screen

2 min read

Using big data for better health outcomes

Converging big data with the Internet of Things (IoT) opens new frontiers for personalized medicine and predictive healthcare, promising improvements...

Read More