Editorial

connected people digital icons

2 min read

Confidentiality in conflict management

Conflicts are inevitable in any workplace, from misunderstandings between patients and providers to disagreements among healthcare staff.

Read More
Image of someone signing an agreement for blog about Terminating a BAA

2 min read

Terminating a BAA

Terminating a business associate agreement (BAA) means ending the legal contract between a covered entity and a business associate. This action...

Read More
law balance statue

2 min read

Why ethical principles are the backbone of HIPAA compliance

Implementing the Health Insurance Portability and Accountability Act (HIPAA) and upholding patient privacy heavily relies on fundamental ethical...

Read More
laptop screen with hands on keyboard

2 min read

The importance of traceability in HIPAA compliant software development

While efforts have been made to address privacy and security in software development, one aspect that is usually ignored is traceability.

Read More
Image of someone on a computer for blog about Using video conferencing for communicating with deaf patients

3 min read

Using video conferencing for communicating with deaf patients

Research on Video Relay Interpretation (VRI) indicates that video conferencing can help deaf patients overcome interpretation barriers and enhance...

Read More
Image of gavel for blog about Legal liabilities associated with a data breach 

2 min read

Legal liabilities associated with a data breach

The legal liabilities stemming from data breaches are extensive and multifaceted. Beyond fines and lawsuits, organizations risk long-term damage to...

Read More
diabetes device in arm with smartphone app

2 min read

Should remote monitoring technologies be HIPAA compliant?

Yes, remote monitoring technologies (RMTs) should be HIPAA compliant.

Read More
Image of scale for blog about What is ECCS?

2 min read

What is ECCS?

Ethical compliance and conduct standards (ECCS) outline acceptable behaviors and practices for staff. An International Journal of Research in...

Read More
digital lock with health symbol blue

2 min read

Building trust in health information exchanges

Health Information Exchanges (HIEs) have the potential to transform health care by providing secure and efficient access to patient data. These...

Read More
Image of binder for blog about A guide to developing policies for handling PHI

3 min read

A guide to developing policies for handling PHI

Protected health information (PHI) is among the most sensitive data in healthcare, and safeguarding establishes patient privacy, maintains trust, and...

Read More
Image of file folders for blog about Can you be charged for requesting a copy of your PHI?

1 min read

Can you be charged for requesting a copy of your PHI?

Patients can be charged a fee for requesting a copy of their protected health information (PHI), but the fee must comply with the guidelines set...

Read More
Image of paper people for blog about The significance of the nondiscrimination rule in health programs and activities

3 min read

The significance of the nondiscrimination rule in health programs and activities

In 2024, the Office for Civil Rights (OCR) within the Department of Health and Human Services (HHS) made strides in enforcing civil rights and...

Read More
Image of laptop for blog about What are technology-neutral standards? 

1 min read

What are technology-neutral standards? 

The HHS Security Series notes, “When the final Security Rule was published, the security standards were designed to be “technology neutral” to...

Read More