March 30th, 2020

Working from Home? Is Zoom HIPAA-Compliant for Video Conferences & Calls?

    In the midst of the coronavirus crisis and with many working from home, many businesses may be wondering: Is Zoom HIPAA-compliant? While it is true that President Trump has relaxed HIPAA-compliance requirements around telehealth (which includes video teleconferencing) for the duration of the Covid-19 pandemic, the pandemic will eventually end and companies who […]

March 26th, 2020

What We Call “Quasi-HIPAA-Compliance” 

Are your organization’s service providers really HIPAA compliant, or are they only quasi-HIPAA compliant? What do we mean?  Okay, we’ll be honest – quasi-HIPAA compliant isn’t an accepted term yet – but it should be. When we talk about quasi-HIPAA compliance, we’re referring to setups and services that look like they’re HIPAA compliant and share […]

March 19th, 2020

Is Amazon Simple Email Service (SES) HIPAA Compliant?

Because Amazon Web Services (AWS) is very inexpensive, very well known, and offers “HIPAA-compliant” solutions to some degree, we are often asked if, and to what degree, Amazon Simple Email Service (SES) is HIPAA compliant. AWS is a big player offering countless services on which companies can build and/or host applications and infrastructures. One of the […]

March 18th, 2020

Email Templates for SMTP and API Secure Email Sending

Server-side email templates that can be utilized when sending email messages through LuxSci’s APIs and LuxSci’s SMTP services are now available.  In particular, users can: Create and manage up to 100 templates per user through LuxSci’s web site or via API commands. Templates can not only define the subject and bodies of the messages that […]

March 2nd, 2020

Did You Know: Spam Filtering & Virus Protection Go Hand-in-Hand

You may already be aware that spam filtering can save you from having to deal with countless emails, but did you know that it can also help you with virus protection? Spam can be far worse than annoying promotional emails you never asked for. It’s also one of the main paths of entry that hackers […]