We spend significant time discussing important items to do and things to consider in securing Protected Health Information (“PHI”). This assumes one..
Effective access control is a fundamental part of securing Protected Health Information (“PHI”). Access control is essentially giving access when and..
Transferring PHI without an executed Business Associate Agreement ("BAA") has become a point of intense focus for federal regulators, and one from..
The proper destruction of electronic Protected Health Information (“ePHI”) is often overlooked and, if done improperly, can lead to impermissible..
Recent events indicate what we have long suspected; attackers often target the same organizations again after a successful attack. This exact scenario..
If you had a breach in 2017 that affected less than 500 individuals, the deadline to notify the U.S. Department of Health and Human Services (“HHS”)..
Having patients access their health records has important clinical benefits, which is a significant reason why it is a right patients are provided in ..
Do you know exactly where that PHI is stored by the cloud provider? In some instances the cloud storage vendor might store, backup, or process the PHI..