Large-Scale HIPAA Security Breach: Improper Use of GitHub
Recently, the improper use of GitHub led to a large-scale HIPAA security breach, leaving the protected health information (PHI) of 150,000 - 200,000 patients available through publicly [...]
Recently, the improper use of GitHub led to a large-scale HIPAA security breach, leaving the protected health information (PHI) of 150,000 - 200,000 patients available through publicly [...]
BlueJeans is a cloud-based telecommunications platform that was created in 2009 by Verizon. With the uptick in the use of video conferencing for telehealth, it is important to consider [...]
The Department of Health and Human Services (HHS) maintains a list of health-related data breaches affecting 500 or more individuals. HHS obtains this information from the [...]
Companies enter into agreements with Google for use of various Google products, including G Suite, G Suite for Education, and G Suite for Government. These agreements [...]
Calendly is a tool that allows businesses to schedule appointments and meetings, integrating with many popular calendar applications. As a software application, under HIPAA, Calendly is considered a business [...]
RingCentral is a cloud-based service that offers phone, messaging, video, and fax solutions for businesses. The use of cloud-based applications for these services, allows customers to have access to [...]
A HIPAA service is a service performed by one entity, that enables another entity to meet its HIPAA compliance obligations. Under HIPAA, healthcare providers frequently contract with vendors who [...]
The HIPAA workforce definition is critical to understanding which entities a covered entity must enter into business associate agreements with. The HIPAA workforce definition is discussed below. [...]
In a recent study conducted by the Ponemon Institute, it was determined that 54% of healthcare vendors had experienced at least one data breach affecting protected [...]
Under the HIPAA Privacy Rule, a covered entity may, in some circumstances, be liable for its business associate breach under the business associate agreement. When May [...]