woman holding smartphone

3 min read

Why HIPAA doesn’t cover period tracking apps

Most period-tracking apps are not directly associated with a healthcare provider or covered entity. They typically collect data for consumer use rather than for healthcare treatment, billing, or operational purposes and, therefore, don’t fall under...

Read More
law gavel over money

1 min read

Plastic Surgery Associates of South Dakota Settles with OCR for $500,000

On October 31, 2024, the US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) announced a $500,000 settlement with Plastic...

Read More
Image of hooded figure for blog about Healthcare ransomware attacks continue to increase in number and severity

3 min read

Report shows healthcare ransomware attacks are increasing

The healthcare sector has seen a rise in ransomware attacks, even as many other industries have experienced a decline. According to the State of...

Read More
Image of a Nokia phone for blog about Nokia investigates breach after hacker claims to steal source code

2 min read

Nokia investigates breach after hacker claims to steal source code

Nokia, a leader in telecommunications, is investigating a cybersecurity breach after a hacker, known as IntelBroker, claimed to have accessed and is...

Read More
blue laptop with floating email icons

3 min read

Healthcare breach roundup: Week of 11/04/24

Healthcare data breaches expose sensitive information of patients and clients. Despite advances in cybersecurity, healthcare organizations remain...

Read More
digital concept of gray security shield

3 min read

How do we protect patient data against insider threats?

Insider threats put the healthcare industry's security and confidentiality of patient data at risk. Healthcare organizations often overlook potential...

Read More
exterior shot of US White House

3 min read

How Trump 2.0 could transform healthcare policies and privacy

President-elect Donald Trump’s return could bring several changes in US health policy, with reforms across Medicaid, the Affordable Care Act, and...

Read More
Image of tablet, laptop, and phone, for blog about how to handle the threat of lost devices 

2 min read

How to handle the threat of lost devices 

With the shift towards digital records, healthcare facilities rely on mobile devices to access and store patient data. These devices are prime...

Read More
medical symbol for post The HHS’ 5 best practices for HIPAA compliance

2 min read

The HHS’ 5 best practices for HIPAA compliance

During the recent Safeguarding Health Information: Building Assurance through HIPAA Security conference, the Department of Health and Human Services...

Read More
Image of lock for blog about Preventing cyberattacks after layoffs

3 min read

Preventing cyberattacks after layoffs

According to a study about the impacts of layoffs on cybersecurity breaches, companies may face an increased risk of cyberattacks after letting...

Read More
Image of file folders for blog about Should business associates provide individuals with an accounting of disclosures?

2 min read

Should business associates provide an accounting of disclosures?

The HIPAA Privacy Rule does not require business associates to provide individuals with an accounting of disclosures. This responsibility falls...

Read More
Image of someone sending a message for blog about Third-party messaging apps and HIPAA compliance

3 min read

Third-party messaging apps and HIPAA compliance

Healthcare organizations love being able to message patients on apps, but these providers need to stay HIPAA compliant and maintain patient trust....

Read More
Image of several electornic devices, like a laptop and phone, for blog about Acceptable use policies (AUP) and HIPAA compliance

3 min read

Acceptable use policies (AUP) and HIPAA compliance

An acceptable use policy (AUP) sets clear guidelines on how healthcare employees should securely handle technology and patient data. It outlines...

Read More