Questions? Talk to a Real Person via our Live Chat
By Gil Vidals, , HIPAA Blog

Is Windows RDP HIPAA Compliant and Secure?

One of the great blessings of technology has been an unprecedented ability to work remotely, and connect with teams and customers on a global scale. But for remote workers involved in the transfer of sensitive data and protected health information, particularly those that have business agreements in place to maintain HIPAA compliance, adhering to standards... Continue reading
Infrastructure as Code: A Dynamic Approach
By Gil Vidals, , HIPAA Blog

Infrastructure as Code: A Dynamic Approach

Some exciting new approaches in the world of infrastructure and server management have taken place in recent years. The advent of cloud computing and virtualization is fast transforming a process that once took days and even weeks to employ: hardware configuration and employment of new applications. Infrastructure as Code (IaC), or “programmable infrastructure” as some... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

How Does HIPAA Compliance Apply to Disclosures of PHI Data?

When it comes to businesses in the healthcare sector, the question is often asked: “Do I need to be HIPAA Compliant or Not?” The short answer is that if your application or business handles PHI (protected health information) electronically, the answer is, “Most likely, yes.” Those that use an EMR (electronic medical record) system and... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

Health Information Privacy Rights

What privacy rights do you have with your own personal health information? This a common question with a not-so-simple answer. Any health-related information that could potentially identify an individual (and which there is a reasonable basis to believe so) is considered private health information. A number of things are important in relation to health information;... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

New CMIA Law Strengthens CA Medical Privacy

The state of California is no different than other states when it comes to existing loopholes in federal laws and regulations. These loopholes continue to allow for breaches of patient health information (PHI). Common ways that patient information has been leaked are from the Explanation of Benefits letters and communications from Health Insurance plans. Each state... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

How to Dispose of PHI Data

The HIPAA privacy and security rules require certain steps be taken during the destruction or removal of PHI (protected health information). These portions of the act mandate "reasonable safeguards to limit incidental, and avoid prohibited, uses and disclosures of PHI." What this means is that if HIPAA data is left in a trash can or an old hard drive that is replaced and discarded, HIPAA is violated.
Skip to content