HIPAA Compliance (20)

What are the HIPAA rules for video conferencing?

2 min read

What are the HIPAA rules for video conferencing?

The HIPAA rules for video conferencing in teletherapy require that any platform used has encryption, secure user authentication, and safe data...

Read More
Disclosing a minor's PHI

3 min read

Disclosing a minor's PHI

Disclosing a minor’s PHI involves careful consideration of both HIPAA regulations and state-specific laws. While parents generally have the right to...

Read More
HIPAA compliance in patient-generated health data (PGHD)

3 min read

HIPAA compliance in patient-generated health data (PGHD)

Healthcare providers can ensure HIPAA compliance when handling patient-generated health data (PGHD) by treating it as protected health information...

Read More
What is a business associate agreement?

3 min read

What is a business associate agreement?

A business associate agreement (BAA) is a legally binding contract establishing a relationship between a covered entity under the Health Insurance...

Read More
EDI in healthcare

4 min read

EDI in healthcare

Electronic data interchange (EDI) has recently impacted how healthcare organizations manage and share information. The technology enables the secure...

Read More
How does HIPAA enforce data security?

6 min read

How does HIPAA enforce data security?

HIPAA, the Health Insurance Portability and Accountability Act, enforces data security primarily through its Security Rule, which sets national...

Read More
Securing patient data in digital consent forms

2 min read

Securing patient data in digital consent forms

Healthcare providers can secure patient data in digital consent forms using strong encryption, robust access controls, and secure storage with...

Read More
Updating your HIPAA documentation

2 min read

Updating your HIPAA documentation

As HIPAA rules are periodically updated to address new challenges and technologies, maintaining current documentation helps avoid costly penalties...

Read More
HIPAA and email deletion rules

3 min read

HIPAA and email deletion rules

HIPAA requires that emails containing protected health information (PHI) be securely managed, retained, and deleted to prevent unauthorized access...

Read More
What do you need to meet HIPAA standards?

3 min read

What do you need to meet HIPAA standards?

To meet HIPAA standards when dealing with protected health information (PHI), you need a comprehensive framework that covers multiple aspects of your...

Read More
What is a cipher? 

2 min read

What is a cipher? 

A cipher is a cryptographic algorithm that transforms intelligible data, known as plaintext, into an unintelligible form, called ciphertext. A cipher...

Read More
Legal considerations for healthcare marketing and HIPAA

4 min read

Legal considerations for healthcare marketing and HIPAA

Marketing efforts in healthcare must work with requirements outlined in the Health Insurance Portability and Accountability Act (HIPAA), like keeping...

Read More
FAQs: HIPAA audits

2 min read

FAQs: HIPAA audits

A HIPAA audit is a formal review conducted by the Office for Civil Rights (OCR) or a third party to ensure that covered entities and business...

Read More