March 30th, 2020

Is Zoom HIPAA-Compliant?

Zoom is an extremely popular video-conferencing platform. Many healthcare organizations may be wondering: Is Zoom HIPAA-compliant? While it is true that HIPAA compliance requirements around telehealth were relaxed (which includes video teleconferencing) for the duration of the Covid-19 pandemic, the pandemic will eventually end. Companies that have invested time and money in accelerating their telehealth […]

March 26th, 2020

What We Call “Quasi-HIPAA-Compliance”

Are your organization’s service providers HIPAA-compliant, or are they only quasi-HIPAA compliant? What do we mean?  Okay, we’ll be honest – quasi-HIPAA compliant isn’t an accepted term yet – but it should be. When we talk about quasi-compliance, we’re referring to setups and services that look HIPAA-compliant and share some of the features; however, they […]

March 19th, 2020

Is Amazon Simple Email Service (SES) HIPAA Compliant?

Because Amazon Web Services (AWS) is very inexpensive, very well known, and offers “HIPAA-compliant” solutions to some degree, we are often asked if, and to what degree, Amazon Simple Email Service (SES) is HIPAA compliant. AWS is a big player offering countless services on which companies can build and/or host applications and infrastructures. One of the […]

March 18th, 2020

Email Templates for SMTP and API Secure Email Sending

Server-side email templates that can be utilized when sending email messages through LuxSci’s APIs and LuxSci’s SMTP services are now available.  In particular, users can: Create and manage up to 100 templates per user through LuxSci’s web site or via API commands. Templates can not only define the subject and bodies of the messages that […]

March 2nd, 2020

Did You Know: Spam Filtering & Virus Protection Go Hand-in-Hand

You may already be aware that spam filtering can save you from having to deal with countless emails, but did you know that it can also help you with virus protection? Spam can be far worse than annoying promotional emails you never asked for. It’s also one of the main paths of entry that hackers […]