HaveIBeenPwned? Selecting passwords that are not known to Hackers
Users tend to reuse passwords to make their life simple. This includes reusing the same passwords across multiple sites and using the same passwords for years and years. This is bad of course. We see it in the news so frequently that no one is surprised that millions of accounts are compromised at companies every […]
HIPAA-Compliant Online Forms: Legal & Flexibility Considerations
Online forms are crucial for many companies’ data collection, processing, and communication. They can be used as a point of customer contact, for surveys, as part of legal agreements, and for gathering data. They can also be a critical element in an organization’s marketing process. While online forms have proven helpful in various situations, they […]
Custom Email Header Tracking and Reporting
Does your outbound email sending system incorporate custom email headers in each message … headers that track potentially important per-message information such as: Email Campaign ID Customer Segment ID Unique message ID Auto-responder code etc.? Many systems include such information; however, the email headers that these and other types of tracking information are recorded in […]
How to Evaluate any New Software or Service for HIPAA Compliance
If your organization operates in the health sector or processes data for clients that are, then it will need to deal with all ePHI in a HIPAA-compliant manner. This means that HIPAA-compliant software and services are required whenever and wherever protected health information is dealt with. HIPAA regulations limit the range of services that a […]