


Protected Health Information (PHI): Everything You Need to Know about HIPAA and PHI
What is Protected Health Information (PHI)? The Health Insurance Portability and Accountability Act (HIPAA) is a 1996 federal law that regulates privacy standards in the healthcare sector. In the early 1990s, it became clear that computers and digital records would...
HIPAA Audits for Insurance Agents
Insurance agents who handle protected health information (PHI) are required to comply with the Health Insurance Portability and Accountability Act (HIPAA). One way to ensure compliance is to undergo a HIPAA compliance audit. In this blog post, we’ll discuss what...
HIPAA Compliance in Marketing and Communications for Insurance Agents
Are you an insurance agent who handles protected health information (PHI)? If so, you must comply with the Health Insurance Portability and Accountability Act (HIPAA) when it comes to marketing and communications. In this blog post, we’ll cover some essential...
The Ohio Data Protection Act and HIPAA Compliance
Every day, there seems to be a new headline about another organization whose data security has been breached. It’s happening to big and small entities — even ones you wouldn’t expect. As cyberattacks become more and more sophisticated, the need to have a strong data...