Editorial

Image of stethescope and clipboard for blog about What to know about the changes to the HIPAA Security Rule 

1 min read

What to know about the changes to the HIPAA Security Rule 

The Office for Civil Rights (OCR) has announced significant changes to the HIPAA Security Rule, marking the first major update since 2013. These...

Read More
Image of someone on a computer for blog about What is digital health literacy? 

1 min read

What is digital health literacy?

Digital health literacy is being able to seek, find, understand, and apply health information from electronic sources to address health-related...

Read More
Image of someone on their phone for blog about Protecting patient privacy on social media 

2 min read

Protecting patient privacy on social media

Healthcare professionals must exercise extreme caution when using social media, as improper postings can lead to serious breaches of patient trust,...

Read More
female provider hand on tablet

2 min read

Prioritizing nurses' well-being through innovative solutions

Nurses are the backbone of healthcare, yet their well-being often goes unnoticed within the system, which is perpetually stretched by chronic...

Read More
connected people digital icons

2 min read

Confidentiality in conflict management

Conflicts are inevitable in any workplace, from misunderstandings between patients and providers to disagreements among healthcare staff.

Read More
Image of someone signing an agreement for blog about Terminating a BAA

2 min read

Terminating a BAA

Terminating a business associate agreement (BAA) means ending the legal contract between a covered entity and a business associate. This action...

Read More
law balance statue

2 min read

Why ethical principles are the backbone of HIPAA compliance

Implementing the Health Insurance Portability and Accountability Act (HIPAA) and upholding patient privacy heavily relies on fundamental ethical...

Read More
laptop screen with hands on keyboard

2 min read

The importance of traceability in HIPAA compliant software development

While efforts have been made to address privacy and security in software development, one aspect that is usually ignored is traceability.

Read More
Image of someone on a computer for blog about Using video conferencing for communicating with deaf patients

3 min read

Using video conferencing for communicating with deaf patients

Research on Video Relay Interpretation (VRI) indicates that video conferencing can help deaf patients overcome interpretation barriers and enhance...

Read More
Image of gavel for blog about Legal liabilities associated with a data breach 

2 min read

Legal liabilities associated with a data breach

The legal liabilities stemming from data breaches are extensive and multifaceted. Beyond fines and lawsuits, organizations risk long-term damage to...

Read More
diabetes device in arm with smartphone app

2 min read

Should remote monitoring technologies be HIPAA compliant?

Yes, remote monitoring technologies (RMTs) should be HIPAA compliant.

Read More
Image of scale for blog about What is ECCS?

2 min read

What is ECCS?

Ethical compliance and conduct standards (ECCS) outline acceptable behaviors and practices for staff. An International Journal of Research in...

Read More
digital lock with health symbol blue

2 min read

Building trust in health information exchanges

Health Information Exchanges (HIEs) have the potential to transform health care by providing secure and efficient access to patient data. These...

Read More