Texas challenges HHS HIPAA rule on reproductive health privacy
Texas Attorney General has filed a lawsuit against the U.S. Department of Health and Human Services (HHS) challenging the new HIPAA rule on reproductive healthcare ...
Read more
Texas Attorney General has filed a lawsuit against the U.S. Department of Health and Human Services (HHS) challenging the new HIPAA rule on reproductive healthcare ...
Read more
A Texas federal judge made a decision that the guidance set by the HHS’ Office for Civil Rights about website tracking technologies was illegal, stating ...
Read more
Wix is not HIPAA compliant and websites built on the platform should not be used to collect Protected Health Information unless an exception to HIPAA ...
Read more
WhatsApp is not HIPAA compliant and cannot be used to send and receive Protected Health Information unless a patient specifically requests confidential communications via WhatsApp. ...
Read more
A recent comprehensive study conducted by Claroty, a leader in cyber-physical systems (CPS) protection, has highlighted concerning trends within healthcare cybersecurity. This research, outlined in ...
Read more
PayPal is not required to be HIPAA compliant for payment processing activities when a payment collected on behalf of a covered entity relates to a ...
Read more
Intuit QuickBooks is not HIPAA compliant unless the downloadable version of the software is deployed in a HIPAA compliant hosting service that prevents Intuit from ...
Read more
In the constantly evolving cyber threat landscape, the North Korean APT group “ScarCruft” has emerged as a formidable adversary. The recent SentinelOne report unveils the ...
Read more
It is HIPAA compliant to use Marketo Engage to create, collect, maintain, and transmit Protected Health Information (PHI) if the automated marketing platform is part ...
Read more
The HIPAA Omnibus Rule mandates changes to the Privacy, Security, Enforcement, and Breach Notification Rules to implement some – but not all – of the ...
Read more
HIPAA changes – and changes to other Rules that impact HIPAA compliance – happen more frequently than many people appreciate; but, because they have a limited impact ...
Read more
The length of time it takes to get HIPAA certified depends on who is getting certified, the reason for getting certified, the criteria for certification, ...
Read more
An effective HIPAA security risk assessment enables covered entities and business associates to identify threats to the confidentiality, integrity, and availability of electronic PHI, and ...
Read more
There are no one-size-fits-all HIPAA and social media policies because the Administrative Simplification Regulations were published years before most people had access to social media. ...
Read more
HIPAA training is important because it equips healthcare professionals with the knowledge and skills needed to protect patient privacy, prevent data breaches, ensure legal compliance, foster ethical ...
Read more
Three high-severity vulnerabilities have been identified in a popular form builder plugin for WordPress – Ninja Forms – with over 900,000 active installations. The vulnerabilities ...
Read more
The first Thursday of May is World Password Day, a day dedicated to raising awareness of the importance of password security and the promotion of ...
Read more
Security researchers have demonstrated it is possible to hack the large language models that power AI-based chatbots such as ChatGPT to get around the security ...
Read more
After a hiatus of around 3 months, the Emotet botnet sprung back to life and is sending large volumes of malicious emails. Initially, the email ...
Read more
The answer to the question does HIPAA apply to employers is complicated for, although the Health Insurance Portability and Accountability Act impacts around half of ...
Read more
In most cases, HIPAA compliance is not applicable to education institutions as they are not deemed HIPAA covered entities, but in some instances a school ...
Read more
A recent investigation of the password management practices of the U.S. Department of the Interior has identified multiple password failures which are putting its internal ...
Read more
A valid HIPAA waiver form is required whenever a Covered Entity wants to use or disclose Protected Health Information for a purpose not otherwise required ...
Read more
A couple of years ago, security industry professionals claimed businesses were experiencing a passwordless revolution and some forecast adoption rates in excess of 90% by ...
Read more
Before answering the question what are the HIPAA password requirements, it is important to note that passwords are not a requirement of HIPAA if Covered ...
Read more
Passwords are often a security weak point, but not because of the level of security they provide. If a sufficiently long password is set following ...
Read more
Criminal prosecutions for HIPAA violations made by hospital employees are a relatively uncommon occurrence; but the recent spate of HIPAA prosecutions over the past few ...
Read more
Businesses are realizing the importance of providing security awareness training for the workforce to teach cybersecurity best practices, how to recognize phishing emails, and to ...
Read more
Organizations can invest heavily in cybersecurity and implement multiple layers of defense to stop malicious actors from gaining access their networks, but those defenses can ...
Read more
A joint security alert has been issued by the Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and the Department of Health ...
Read more