


Data Breach: 10 Ways to Prevent This Potential Nightmare
This month, we devoted multiple blog posts to covering major HIPAA violations and their penalties. Today’s post will explain the most common causes of breaches and the easiest ways to prevent them. Internal actors are more likely to cause a data breach than external...
HIPAA and Cloud Computing
On October 7, 2016, HHS released a guidance on HIPAA and cloud computing.¹ As the use of cloud computing continues to grow, it is important for HIPAA covered entities and their Cloud Service Providers (CSPs) to understand how they can use cloud computing while still...
How to Dispose of Electronic Devices if You Are Dealing With Electronic Protected Health Information
People get rid of electronic devices all the time. There’s always a newer, stronger, more sophisticated version of your laptop, smartphone, or tablet. If you’re dealing with PHI (protected health information), however, you must ensure that each and every electronic...
Block Hackers with HIPAA Training
HIPAA Rules require that your organization provide training to employees on privacy and security awareness. Employees should know about the law as well as your organization’s specific policies and procedures. Reminding employees of rules and regulations through HIPAA...