Questions? Talk to a Real Person via our Live Chat
By Gil Vidals, , HIPAA Blog, Resources

How Does HIPAA Compliance Apply to Disclosures of PHI Data?

When it comes to businesses in the healthcare sector, the question is often asked: “Do I need to be HIPAA Compliant or Not?” The short answer is that if your application or business handles PHI (protected health information) electronically, the answer is, “Most likely, yes.” Those that use an EMR (electronic medical record) system and... Continue reading
By Gil Vidals, , Resources

HIPAA Password-Protection Management Best Practices

Why do I need to change my password? How often should my password be changed? When does my password expire? What about service accounts? These are common questions asked by customers, especially those who may be weary of password policies within their hosted environment. It’s important to know that HIPAA regulations require that procedures exist... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

Health Information Privacy Rights

What privacy rights do you have with your own personal health information? This a common question with a not-so-simple answer. Any health-related information that could potentially identify an individual (and which there is a reasonable basis to believe so) is considered private health information. A number of things are important in relation to health information;... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

New CMIA Law Strengthens CA Medical Privacy

The state of California is no different than other states when it comes to existing loopholes in federal laws and regulations. These loopholes continue to allow for breaches of patient health information (PHI). Common ways that patient information has been leaked are from the Explanation of Benefits letters and communications from Health Insurance plans. Each state... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

How to Dispose of PHI Data

The HIPAA privacy and security rules require certain steps be taken during the destruction or removal of PHI (protected health information). These portions of the act mandate "reasonable safeguards to limit incidental, and avoid prohibited, uses and disclosures of PHI." What this means is that if HIPAA data is left in a trash can or an old hard drive that is replaced and discarded, HIPAA is violated.
By Gil Vidals, , HIPAA Blog, Resources

HIPAA Hosting Price Comparisons

When choosing a HIPAA hosting plan, the difference in price between providers (and different plans offered by the same provider) is often driven by the features offered in that hosting environment. Not every hosting environment is the same. In fact, no two are exactly alike. Aside from the absolute minimum amenities required by HIPAA, every host is obliged to offer a variety of options to fit a variety of implementations.
Skip to content