Questions? Talk to a Real Person via our Live Chat
By Gil Vidals, , HIPAA Blog, Resources

HIPAA Hosting Price Comparisons

When choosing a HIPAA hosting plan, the difference in price between providers (and different plans offered by the same provider) is often driven by the features offered in that hosting environment. Not every hosting environment is the same. In fact, no two are exactly alike. Aside from the absolute minimum amenities required by HIPAA, every host is obliged to offer a variety of options to fit a variety of implementations.
HIPAA Logs have Strict Retention Requirements
By Gil Vidals, , HIPAA Blog, Resources

HIPAA Logs have Strict Retention Requirements

HIPAA compliance necessarily involves comprehensive standards and procedures, vital for protecting Patient Health Information. While Covered Entities and Business Associates are bound by the laws of their particular state with regard to how long medical records must be retained, the regulations concerning HIPAA logs are different. For example, HIPAA requires that you keep track of who accesses protected... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

HIPAA Compliant CMS Choices

A CMS (Content Management System) is an easy-to-use and convenient way to build and manage your website and to update content quickly and efficiently. A CMS platform requires very little technical prowess and minimal knowledge (if any) of website coding. Being responsible for protecting patient privacy, extra steps need to be taken to ensure that... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

Bring Your Own License for HIPAA Compliant Hosting

To many in the field of HIPAA software and HIPAA hosting, being forced to use any particular solution or implementation is less than ideal. One of the ways in which covered entities often feel that they are “nickel-and-dimed” is in the matter of software licensing. A piece of software that interacts with or stores HIPAA... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

Designing a Database Structure to Maximize Your EMRs

Databases, specifically Structured Query Language (SQL) databases, are known for being a weak point in the different layers of security that online businesses must implement to be safe-and-secure from cyber attacks. SQL injection attacks are responsible for many of the most egregious violations of consumer data and privacy. But in the field of healthcare and... Continue reading
Skip to content