What Does the HIPAA Security Rule Say About Mobile Computing?

HIPAA 42 CFR Part 2 featured

With modern computing increasingly moving into a mobile paradigm of remote workers, laptops, and smart devices, the threat to security in various industries is only increasing. This is no more true than in healthcare, where HIPAA breaches related to mobile devices are becoming more common. 

This article will discuss the HIPAA security rule, how it governs mobile devices in regulated settings, and how to minimize your attack surface and liability. 

 

Read More

Maintaining HIPAA Compliance with IoT Devices

HIPAA IoT featured

In previous blog posts, we’ve discussed the role of technology and HIPAA (related explicitly to HITECH regulations). However, the growth of intelligent devices and the Internet of Things (IoT) has led to a sea change in how Covered Entities (CEs) and Business Associates (BAs) manage their patients. Likewise, it adds new wrinkles to how these organizations manage their compliance requirements under HIPAA. 

Here, we’ll discuss some of the overlaps between HIPAA requirements and risks posed by smart, IoT-based devices. 

 

Read More

Protected Health Information, File Sharing and Email

HIPAA featured

Protecting patient information is a crucial and necessary part of healthcare… but so is communicating effectively with patients. Considering that email continues to be the most common form of electronic communication, it stands to reason that providers meet patients where they are. 

However, HIPAA regulations have rather strict requirements for protecting PHI, and plain email just doesn’t cut it. Here, we’ll discuss how to effectively use email to engage with patients without breaking compliance.

 

Read More