Category: HIPAA

Illustration of a coputer demonstrating healthcare cybersecurity challenges with the text "Securing ePHI in the Age of Digital Health Tools to the left.
Securing ePHI in the Age of Digital Health Tools is a three-part blog series that explores how healthcare providers can protect PHI and mitigate healthcare data security risks associated with patient engagement technologies by implementing the right security protocols. Read parts two and three now. Supply chain attacks are a…

Illustration of healthcare application security measures with the text "Securing ePHI in the Age of Digital Health Tools" to the left.
Securing ePHI in the Age of Digital Health Tools is a three-part blog series that explores how healthcare providers can protect PHI and mitigate healthcare data security risks associated with patient engagement technologies by implementing the right security protocols. Read parts one and three now. In the first article of…

Illustration of a cell phone with a login for securing patient data and the text "Securing ePHI in the Age of Digital Health Tools" to the left
Securing ePHI in the Age of Digital Health Tools is a three-part blog series that explores how healthcare providers can protect PHI and mitigate healthcare data security risks associated with patient engagement technologies by implementing the right security protocols. Read parts one and two now. Patient engagement technology is in…

blog thumbnail
Messenger™, also known as Facebook Messenger™, is a free instant messaging app developed in 2011 and available on desktop or mobile devices. Facebook Messenger™ allows users to send and exchange messages, photos, stickers, videos, audio, and files, in addition to supporting voice and video calls. In April of 2020 Messenger…

blog thumbnail
  Telehealth may seem like a new concept fueled by COVID-19, but in reality, telehealth companies have been around for many years and are growing in popularity. Due to the outbreak of COVID-19, healthcare providers and patients are turning to telehealth companies to fill the void. Providers are also asking…

Patient Engagement
In order for a communications platform to be considered HIPAA compliant, it must fulfill the following requirements: Employ end-to-end encryption Implement access control Enable audit controls  Sign a business associate agreement (BAA) Recommended:  Zoom® is a HIPAA compliant telehealth software WhatsApp® provides end-to-end encryption, but that does not mean that it…

hipaa compliant telehealth software thumbnail
Updated on March 2, 2021. Over the past year or so, the regulations around the use of videoconferencing software for telehealth have been liberalized as the U.S. government sought to move an increasing number of doctor’s appointments online. In early 2020, The Department of Health and Human Services (HHS) created…

blog thumbnail
What Is HIPAA? The Health Insurance Portability and Accountability Act (HIPAA) protects patients’ privacy by limiting access to PHI  (Protected Health Information) and governing acceptable use of their health data. The HIPAA Privacy Rule is composed of national regulations for the use and disclosure of PHI in healthcare treatment, payment,…

Medical Web Experts launches new HIPAA-compliant cloud hosting
Most HIPAA compliant cloud hosting services don’t do a very good job of making considerations for the application or website they’re hosting. This creates a disconnect between developers and systems administrators, putting more pressure on the system administrators to customize the environment to support the software, which they likely don’t…

mobile HIPAA compliance
According to a 2015 Statista study, approximately 81 percent of doctors use their smartphones for professional purposes. And the results of another study revealed that 64 percent percent of doctors surveyed use text messaging to send and receive patient data among colleagues, such as patient diagnoses, test results, and medical…