![HIPAA and Cloud Computing Part II](https://www.totalhipaa.com/wp-content/uploads/2016/10/Cloud-Computing-Blog-Photo.png)
![HIPAA and Cloud Computing Part II](https://www.totalhipaa.com/wp-content/uploads/2016/10/Cloud-Computing-Blog-Photo.png)
![Encrypting Devices](https://www.totalhipaa.com/wp-content/uploads/2016/10/shutterstock_402708574.jpg)
Encrypting Devices
Most electronic devices come with the ability to encrypt the internal drive. Encrypting your data adds an extra protection to your files by minimizing the risk of a breach in the event your device is lost or stolen. This is because an encrypted and password protected...![HIPAA Compliant Email Encryption Review](https://www.totalhipaa.com/wp-content/uploads/2016/10/emailencryptionblog.png)
HIPAA Compliant Email Encryption Review
Covered Entities, Business Associates and Business Associate Subcontractors are required to protect the PHI they store and come in contact with at rest, storage and transit. Today we are going to be discussing your options for protecting ePHI in transit;...![OCR’s Phase 2 of HIPAA Audit Program Focuses on Business Associates](https://www.totalhipaa.com/wp-content/uploads/2016/09/shutterstock_89473318.png)
OCR’s Phase 2 of HIPAA Audit Program Focuses on Business Associates
The Department of Health and Human Services’ (HHS) announcement that they will begin auditing Business Associates in October motivated a Covered Entity’s compliance officer to call Total HIPAA last week. He had done a Google search on what a Covered Entity should do...![Multi-Line Agencies and Privacy Requirements](https://www.totalhipaa.com/wp-content/uploads/2016/09/AgencyComplianceBlog.png)