Tag: HIPAA email

Infrastructure Requirements for Marketing and Transactional Email

June 14, 2024

To design an appropriate email infrastructure, organizations must understand the types of emails they plan to send. Outside of regular business communications between colleagues, marketing and transactional emails are used to communicate externally with clients and customers. Although they are often lumped together, transactional and marketing emails serve different purposes and require different hardware configurations […]

Personalize Healthcare Communications to Improve the Patient Experience

August 16, 2022

Recent survey results from CVS Health indicate that healthcare patients desire a more personalized healthcare experience. Over the last ten years, the online experience has become highly customized. Online vendors have more customer data and use it to extend personalized offers, reminders, and updates. Although people are concerned about online privacy, they are more likely […]

Is Email Archival Required For HIPAA Compliant Email?

April 5, 2022

Customers often inquire if email archival is required by HIPAA regulations in order to have HIPAA compliant email. There is a great deal of confusion and uncertainty here because: HIPAA lists many requirements but does not provide specific instructions on implementing them. It’s ambiguous but provides a great deal of flexibility for organizations. HIPAA email […]

What Are Your Goals for Sending HIPAA-Compliant Emails?

October 7, 2020

…and how Do They Influence Which Provider You Choose? So, you’ve heard that you need to send HIPAA-compliant emails. Maybe your company is only just starting to send ePHI in its messages. Perhaps it just wants to be extra careful, and limit the potential repercussions if ePHI is accidentally sent in an email. It could […]

What is Willful Neglect Under HIPAA?

March 7, 2019

The Health Insurance Portability and Accountability Act of 1996 (HIPAA), spells out rules for the privacy and protection of health information. The HIPAA Privacy and Security Rules establish standards for implementing physical, administrative, and technical safeguards to ensure that Protected Health Information (PHI) is handled with the utmost confidentiality and integrity. The failure to adhere […]