4 min read
Using patient testimonials while maintaining HIPAA compliance
Patient testimonials serve as powerful marketing tools for healthcare organizations. According to researchers studying healthcare marketing...
4 min read
Patient testimonials serve as powerful marketing tools for healthcare organizations. According to researchers studying healthcare marketing...
1 min read
Based on our research, Google Jamboard is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services...
1 min read
Based on our research, Cisco Jabber is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...
6 min read
The FAQs provided by the Office of the National Coordinator for Health IT explain that, “The following entities must follow The Health Insurance...
1 min read
Based on our research, Outreach is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS) to...
2 min read
Medical writers are not directly bound by the Health Insurance Portability and Accountability Act (HIPAA) unless they work for a covered entity or a...
8 min read
Healthcare organizations must balance leveraging the power of marketing while upholding the stringent requirements of HIPAA. Patient privacy isn't...
1 min read
Based on our research, Pega is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS) to...
5 min read
Sometimes during normal healthcare activities, patient information might accidentally be seen or heard by others, even when following proper...
3 min read
The HIPAA Administrative Simplification provisions ensure consistent electronic communication in healthcare across the U.S. They do this by creating...
3 min read
Email security accountability refers to the idea that individuals are responsible for safeguarding email messages and the data within. When it comes...
3 min read
Healthcare employees play an important role in email security. They are not just end users but active guards and communicators of sensitive...
3 min read
Email user authentication verifies the identity of users as authorized to receive or send an email before a message is delivered. Owing to identity...