HIPAA Compliance (35)

The difference between the HIPAA Privacy Rule and the Security Rule

3 min read

The difference between the HIPAA Privacy Rule and the Security Rule

HIPAA’s Privacy Rule focuses on protecting the privacy of all forms of protected health information (PHI), whether electronic, paper, or oral. It...

Read More
Legal marijuana and HIPAA

3 min read

Legal marijuana and HIPAA

When the use of marijuana is prescribed or discussed by a healthcare provider, the information is protected under HIPAA.

Read More
What are the HIPAA rules for video conferencing?

2 min read

What are the HIPAA rules for video conferencing?

The HIPAA rules for video conferencing in teletherapy require that any platform used has encryption, secure user authentication, and safe data...

Read More
Disclosing a minor's PHI

3 min read

Disclosing a minor's PHI

Disclosing a minor’s PHI involves careful consideration of both HIPAA regulations and state-specific laws. While parents generally have the right to...

Read More
HIPAA compliance in patient-generated health data (PGHD)

3 min read

HIPAA compliance in patient-generated health data (PGHD)

Healthcare providers can ensure HIPAA compliance when handling patient-generated health data (PGHD) by treating it as protected health information...

Read More
What is a business associate agreement?

3 min read

What is a business associate agreement?

A business associate agreement (BAA) is a legally binding contract establishing a relationship between a covered entity under the Health Insurance...

Read More
EDI in healthcare

4 min read

EDI in healthcare

Electronic data interchange (EDI) has recently impacted how healthcare organizations manage and share information. The technology enables the secure...

Read More
How does HIPAA enforce data security?

6 min read

How does HIPAA enforce data security?

HIPAA, the Health Insurance Portability and Accountability Act, enforces data security primarily through its Security Rule, which sets national...

Read More
Securing patient data in digital consent forms

2 min read

Securing patient data in digital consent forms

Healthcare providers can secure patient data in digital consent forms using strong encryption, robust access controls, and secure storage with...

Read More
Updating your HIPAA documentation

2 min read

Updating your HIPAA documentation

As HIPAA rules are periodically updated to address new challenges and technologies, maintaining current documentation helps avoid costly penalties...

Read More
HIPAA and email deletion rules

3 min read

HIPAA and email deletion rules

HIPAA requires that emails containing protected health information (PHI) be securely managed, retained, and deleted to prevent unauthorized access...

Read More
What do you need to meet HIPAA standards?

3 min read

What do you need to meet HIPAA standards?

To meet HIPAA standards when dealing with protected health information (PHI), you need a comprehensive framework that covers multiple aspects of your...

Read More
What is a cipher? 

2 min read

What is a cipher? 

A cipher is a cryptographic algorithm that transforms intelligible data, known as plaintext, into an unintelligible form, called ciphertext. A cipher...

Read More