
1 min read
Do community health workers have to comply with HIPAA?
Community health workers access protected health information (PHI), so the workers and the centers they operate in have to comply with HIPAA.
Read More1 min read
Community health workers access protected health information (PHI), so the workers and the centers they operate in have to comply with HIPAA.
Read More1 min read
The Internet Archive appears to be the victim of multiple, targeted attacks that have impacted at least 31 million individuals.
2 min read
Voicemail transcriptions are subject to HIPAA regulations if they contain protected health information (PHI), which includes any identifiable patient...
3 min read
According to the HHS, there are certain situations when providers may share health information with spouses. Providers must understand HIPAA and use...
1 min read
The state recently implemented cybersecurity regulations targeted at general hospital's breach reporting requirements.
2 min read
Privacy is about a patient's control over their information while confidentiality is the healthcare provider's duty to safeguard that information...
2 min read
The US Postal Service is not a business associate under HIPAA because it does not access or use protected health information. Instead, it serves as a...
2 min read
The recent HLTH 2024 conference, held October 20-23 in Las Vegas, gathered leaders and innovators to explore the future of healthcare technology,...
2 min read
In many under-resourced healthcare facilities across the world, patient privacy can become compromised, especially when a high volume of patients is...
2 min read
Recent reports have uncovered a surge of malicious apps on Google Play, the official Android app store. More than 200 harmful apps have been...
4 min read
Phishing attacks have become one of the most common cyber threats today, with hackers continuously refining their techniques to exploit unsuspecting...
4 min read
Fileless malware is malicious code that uses a company’s memory instead of the hard drive. It uses legitimate programs to compromise a computer...
2 min read
Email retention refers to the policies and practices governing how long emails are stored, archived, or deleted. In the healthcare sector, where...