At the start of the month, the Justice Department laid charges against three key members of FIN7, one of the most sophisticated cyber-criminal rings that has ever been seen. The arrests came as a result of cooperation between government agencies such as the FBI, credit card companies Visa and Mastercard, ... Read the complete post
HIPAA covered entities form partnerships with third parties to safeguard their data assets effectively. Business associate agreements (BAAs) formalize these relationships and, importantly, describe the HIPAA-related risks and responsibilities that business associates (BAs) will take on.
The written contract between the covered entity and business associate must meet the following ... Read the complete post
While Russia always seems to be in the news, the stories are so tangled that it’s difficult to figure out what is happening. There are meetings in Helsinki, intelligence agencies saying one thing, the President saying another and confusion on both sides of the political spectrum.
The most important thing ... Read the complete post
The Health Insurance Portability and Accountability Act (HIPAA) applies to protected health information (PHI). When stored or transmitted electronically, the HIPAA Security and Privacy Rules require covered entities to safeguard the integrity and confidentiality of electronic protected health information (ePHI). The most common way in which ePHI is shared ... Read the complete post
Simple Mail Transfer Protocol (SMTP) is a way in which email travels across the internet. An SMTP relay is a mail server that passes on your email message to another server that can transfer your message to the intended recipient. Email providers like Gmail own and manage SMTP servers; some ... Read the complete post