Image of lock for blog about What is DevSecOps?

2 min read

What is DevSecOps?

DevSecOps, or development, security, and operations revolves around integrating security practices into the entirety of the software development lifecycle (SDLC). According to DevSecOps: a Multivocal Literature Review, “The need for security in...

Read More
Image of government building for blog about Do the staff of the state attorney's office need to comply with HIPAA?

2 min read

Do the staff of the state attorney's office need to comply with HIPAA?

The staff of the state attorney's office are enforcers of HIPAA and have duties that may place their staff in contact with health data. To prevent...

Read More
Image of smart watch for blog about HIPAA compliance with tracking technologies

4 min read

HIPAA compliance with tracking technologies

The Health Insurance Portability and Accountability Act (HIPAA) sets strict guidelines to protect patient information, including how tracking...

Read More
Image of shield for blog about What is Title II of HIPAA?

2 min read

What is Title II of HIPAA?

Title II of HIPAA is the Administrative Simplification provision, designed to improve the efficiency of healthcare systems by standardizing the...

Read More
Image of shield for blog about Federal government unveils updated cyber incident response plan

3 min read

Federal government unveils updated cyber incident response plan

The federal government has proposed updates to the National Cyber Incident Response Plan (NCIRP) to strengthen public-private partnerships and...

Read More
medical symbol on shield

2 min read

The concept of breach vs. disclosure under HIPAA

Section 160.103 of the HIPAA Privacy Rule defines a disclosure as the release, transfer, provision of access to, or divulging of PHI outside the...

Read More
floating legal icons

2 min read

The future of AI regulation

In December 2024, a bipartisan House Task Force on Artificial Intelligence released a final report urging Congress to prioritize existing laws over...

Read More
blue and pink security lock

1 min read

OCR report: Data breaches rise 8.4% in first half of 2024

From January to June 2024, 387 data breaches involving 500 or more records were reported to the Office for Civil Rights (OCR), marking an 8.4%...

Read More
floating legal icons

2 min read

OCR to resume HIPAA privacy audits after 7-year gap

After a seven-year break, the Office for Civil Rights (OCR) restarts its HIPAA privacy audits because of the surge in cyberattacks targeting...

Read More
Image of women showing benefits for blog about When can health plans communicate without patient authorization?

2 min read

When can health plans communicate without patient authorization?

Health plans can communicate patient information without their authorization primarily for purposes related to treatment, payment, or healthcare...

Read More
Image of someone tapping a gavel for blog about The impact of judicial interpretation on data privacy

2 min read

The impact of judicial interpretation on data privacy

Judicial interpretation helps clarify existing laws, influencing the development of state-specific regulations, and addressing challenges brought by...

Read More
marijuana plant with stethoscope

3 min read

Do medical marijuana companies need to comply with HIPAA?

As the U.S. government considers reclassifying cannabis from a Schedule I to a Schedule III substance, the conversation around patient privacy and...

Read More
Image of someone on a computer for blog about Hacker leaks Cisco DevHub data

2 min read

Hacker leaks Cisco DevHub data

A hacker known as IntelBroker has leaked 2.9 GB of files from Cisco's publicly accessible DevHub platform. However, Cisco insists that its systems...

Read More