Questions? Talk to a Real Person via our Live Chat
By Gil Vidals, , HIPAA Blog, HIPAA Compliance, Resources

Why HIPPA Compliant Hosting Providers Should Hire a CISSP

Regulatory Compliance | Risk Assessment | Information Assurance | Password Management When providing services to HIPAA clients, guidelines have to be followed and rules put into place; this requires someone that can manage these restrictive measures and become intimately familiar with the processes involved. Professionals who have obtained the CISSP credentials possess this knowledge, with... Continue reading
By Gil Vidals, , HIPAA Blog, HIPAA Compliance, Resources

Differences Between PCI DSS Compliance & HIPAA Compliance

HIPAA and PCI DSS are both frameworks for complying with legal guidelines that ensure the underlying data is protected appropriately. So what are the differences? Whereas HIPAA is focused on protecting Protected Health Information (PHI) or Electronic Health Records (EHR), PCI-DSS is centered around an individual’s credit card data. HIPAA is the Health Insurance Portability... Continue reading
By Gil Vidals, , HIPAA Blog, Resources, Security

Protected Health Information – What, When, Where, Why

Protected Health Information must be encrypted according to HIPAA $164.312 Technical safeguards. At first glance this seems obvious even to a casual observer. PHI data must be encrypted because it contains the private health records of a patient, and this private information must be carefully safeguarded. It’s easy to understand that the confidential data must... Continue reading
By Gil Vidals, , HIPAA Blog, HIPAA Compliance, Resources

HIPAA Fundamentals

HIPAA is the legislature that was proposed by Senators Kennedy and Kassebaum and signed into law by President Clinton in 1996. Title II, a standard of electronic health care transactions This section defines a national standard by which companies that are transacting in Protected Health Information must follow. Protected Health Information or PHI What is... Continue reading