The purpose of duty to warn in therapy

3 min read

The purpose of duty to warn in therapy

While therapy is built on a foundation of trust and confidentiality, therapists must sometimes disclose information in the interest of public safety. The "duty to warn," has been the subject of extensive legal and ethical debates, shaping how mental...

Read More
Barriers to mental healthcare in college students

3 min read

Barriers to mental healthcare in college students

Students in college frequently struggle with accessing mental healthcare due to the stigma, perceived barriers, and time constraints. However,...

Read More
Celebrating nearly three decades of protecting patient privacy.

2 min read

Celebrating nearly three decades of protecting patient privacy

The HHS celebrates 28 years of health data protection and advancement in patient privacy.

Read More
EDI in healthcare

4 min read

EDI in healthcare

Electronic data interchange (EDI) has recently impacted how healthcare organizations manage and share information. The technology enables the secure...

Read More
How does HIPAA enforce data security?

6 min read

How does HIPAA enforce data security?

HIPAA, the Health Insurance Portability and Accountability Act, enforces data security primarily through its Security Rule, which sets national...

Read More
Securing patient data in digital consent forms

2 min read

Securing patient data in digital consent forms

Healthcare providers can secure patient data in digital consent forms using strong encryption, robust access controls, and secure storage with...

Read More
Including limited data sets in an account of disclosures

1 min read

Including limited data sets in an account of disclosures

Limited data sets are exempt from a patient's right to an accounting of disclosures.

Read More
Maintaining HIPAA compliance when using IoT devices

2 min read

Maintaining HIPAA compliance with IoT devices

Healthcare providers can maintain HIPAA compliance in patient communication through Internet of Things (IoT) devices by implementing robust security...

Read More
Adopted standards and operating rules from the CMS

3 min read

Adopted standards and operating rules from the CMS

According to the Centers for Medicare and Medicaid Services, “HIPAA required HHS to establish national standards for electronic transactions to...

Read More
Data security vs. cyber security

2 min read

Data security vs. cyber security

Data security focuses on protecting data from unauthorized access, corruption, or theft through measures such as encryption, access controls, and...

Read More
Confidant Health's unsecured database unveiled by security researcher

1 min read

Confidant Health's unsecured database unveiled by security researcher

On September 6, 2024, Confidant Health’s unsecured database was discovered by a security researcher exposinghighly sensitive information that...

Read More
Updating your HIPAA documentation

2 min read

Updating your HIPAA documentation

As HIPAA rules are periodically updated to address new challenges and technologies, maintaining current documentation helps avoid costly penalties...

Read More
HIPAA and email deletion rules

3 min read

HIPAA and email deletion rules

HIPAA requires that emails containing protected health information (PHI) be securely managed, retained, and deleted to prevent unauthorized access...

Read More