Questions? Talk to a Real Person via our Live Chat
By Gil Vidals, , HIPAA Blog, Resources

Vulnerability Scans Should be Required for HIPAA Hosting

Malicious actors want your data, and will actively scan networks in order to discover vulnerabilities. Once they know your network’s weaknesses, they attempt to penetrate the network and gain unauthorized access in order to abuse the system in some way. Abuse may include stealing your data or using the compromised system as part of their... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

Differences Between PCI DSS Compliance & HIPAA Compliance

HIPAA and PCI DSS are both frameworks for complying with legal guidelines that ensure the underlying data is protected appropriately. So what are the differences? Whereas HIPAA is focused on protecting Protected Health Information (PHI) or Electronic Health Records (EHR), PCI-DSS is centered around an individual’s credit card data. HIPAA is the Health Insurance Portability... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

Protected Health Information – What, When, Where, Why

Protected Health Information must be encrypted according to HIPAA $164.312 Technical safeguards. At first glance this seems obvious even to a casual observer. PHI data must be encrypted because it contains the private health records of a patient, and this private information must be carefully safeguarded. It’s easy to understand that the confidential data must... Continue reading
By Gil Vidals, , HIPAA Blog, Resources

HIPAA Fundamentals

HIPAA is the legislature that was proposed by Senators Kennedy and Kassebaum and signed into law by President Clinton in 1996. Title II, a standard of electronic health care transactions This section defines a national standard by which companies that are transacting in Protected Health Information must follow. Protected Health Information or PHI What is... Continue reading
Skip to content