Tag: ePHI

7 Ways You Could be Unknowingly Violating HIPAA

August 14, 2024

Non-compliance with HIPAA can easily lead to unintended breaches where PHI data is exposed to unauthorized parties. This can be very expensive! Violating HIPAA can cost anywhere from $100 to $70,000 per violation (or per data record). You don’t want to be caught in a situation where inaction, neglect, or lack of knowledge can result […]

HIPAA Compliant Forms

February 3, 2024

When it comes to digital data collection, there is often a lot of uncertainty surrounding HIPAA compliant forms. Do Healthcare Websites Need HIPAA Compliant Forms? We often have customers ask if their website forms need to be HIPAA compliant. The short answer is that securing patient data is always recommended. You never know what types […]

Improve the Patient Experience with Personalized Patient Engagement

November 7, 2023

Patient expectations of healthcare providers have dramatically changed in the last decade. The introduction of technology and the widespread adoption of digital communications in other industries have increased the pressure on healthcare providers to provide a comparable experience. The 2023 Healthcare Consumer Perspectives on Digital Engagement and AI report conducted by Dynata Research found that […]

How Online Tracking Technologies & Data Collection Threaten Patient Privacy

October 10, 2023

Many healthcare marketers use online tracking technologies to gather user information as they interact with a website or mobile application. After several breaches tied to improper uses of third-party tracking pixels, the Department of Health and Human Services has clarified that data collected via online tracking technologies are often PHI and must be secured according […]

Is TLS Email Encryption Suitable for Compliance?

September 19, 2023

This article discusses what types of email encryption are sufficient to comply with government regulations. TLS email encryption is a good option for many organizations that manage sensitive data. However, it does not protect data at rest. Each organization must perform a risk assessment to determine which encryption methods suit their legal requirements.