• Questions? Contact Sales: 760-290-3460
By Stephen Trout, , HIPAA Blog, Resources

Compliance Checklist for HIPAA IT Pros

Hosting protected health information can be daunting, but going through a checklist of requirements for the compliance of the Health Insurance of Portability and Accountability Act of 1996 (otherwise known as HIPAA) can make the process simpler and more painless.
By Stephen Trout, , HIPAA Blog, Resources

Heartbleed’s Impact on HIPAA Compliance

Back in early April of this year (2014) there was a new security vulnerability discovered known as the “Heartbleed Bug.” This software bug has had an impact on the overall global internet community which uses Secure Socket Layer (SSL) certificates to provide secure websites to the public. As a result, this security issue has had... Continue reading
By Stephen Trout, , HIPAA Blog, Resources

HIPAA Compliant Hosting for European-based Organizations

In order to host and/or migrate medical data being transferred from the European Union (EU), US hosting providers have to undergo and partake in the U.S.-EU Safe Harbor certification process. EU Directive 95/46/EC is the European Union mandate (in conjunction with the European Convention {EC}) for the protection of individuals with regard to Automatic Processing... Continue reading
By Stephen Trout, , HIPAA Blog, Resources

HIPAA Compliant Hosting vs Standard Web Hosting

If you host a website that will interact with patient information, then you should find a HIPAA specialist in web hosting. Patient information is considered Protected Health Information (PHI) or Electronic Health Records (EHR) and is protected by the regulations of the Health Insurance Portability and Accountability Act (HIPAA).
By Stephen Trout, , HIPAA Blog, Resources

Why HIPPA Compliant Hosting Providers Should Hire a CISSP

Regulatory Compliance | Risk Assessment | Information Assurance | Password Management When providing services to HIPAA clients, guidelines have to be followed and rules put into place; this requires someone that can manage these restrictive measures and become intimately familiar with the processes involved. Professionals who have obtained the CISSP credentials possess this knowledge, with... Continue reading
Skip to content