
1 min read
PHI use in nontreatment purposes
Nontreatment uses of patient data are generally handled by administrative staff for purposes like billing or marketing. These administrative purposes require consent and additional safeguards.
Read More1 min read
Nontreatment uses of patient data are generally handled by administrative staff for purposes like billing or marketing. These administrative purposes require consent and additional safeguards.
Read More2 min read
Automatic logoffs are designed to automatically sign users out of a system after a specified period of inactivity. This function is essential in...
2 min read
Healthcare organizations must document HIPAA compliance efforts to safeguard patient information, mitigate legal risks, and prove adherence to...
1 min read
Email servers manage and store email communications, allowing users to send, receive, and organize emails. Given the role of these servers in...
4 min read
Selecting the right authentication types for healthcare systems keeps patient information secure while maintaining ease of access for authorized...
2 min read
A New Jersey-based medical diagnostic lab, siParadigm, recently reported a data breach impacting 26,534 individuals.
2 min read
Missed appointments, or "no-shows," are becoming a problem that even the most basic service systems have not invented a solution yet. No-shows occur...
2 min read
HIPAA prohibits healthcare staff from sharing forms of patient data on their personal social media accounts.
5 min read
The Health Insurance Portability and Accountability Act (HIPAA) is a piece of legislation that influences how organizations manage sensitive patient...
3 min read
The Health-ISAC’s Healthcare Heartbeat report discusses ransomware and cybercrime trends that could affect healthcare organizations. The resource...
2 min read
Considerations for managing pediatric PHI under HIPAA include being compliant with the Privacy Rule, which grants parents access to their child's...
3 min read
Healthcare organizations can avoid HIPAA violations when forwarding emails by using HIPAA compliant email systems, encrypting emails and attachments,...