Three Things About HIPAA That You Probably Didn’t Know

4.75 / 5 (4 votes)

More and more health organizations are implementing publicly-exposed web technologies containing Protected Health Information (PHI) which are subject to the laws of HIPAA. Common examples of such systems include Electronic Health Record (EHR), web portal, Patient Portal and mHealth solutions. When those systems become integrated, PHI must travel from one platform to the other – […]

Read More
 

HIPAA and Healthcare Applications, Part 3 of 3: What You Need to Know About Data Transfer

5 / 5 (1 votes)

We’ve come to the final installment of our three-part series decoding the Security Rule section of HIPAA in connection with healthcare application development. This rule’s detailed guidance on the degree to which the transmission and storage of electronic protected health information (ePHI) must be kept safe makes it especially relevant to patient portal and mHealth […]

Read More
 

HIPAA and Healthcare Applications, Part 2 of 3: What You Need to Know About Auditing

4.50 / 5 (2 votes)

This is the second part of our three-part series discussing the Security Rule section of HIPAA in  healthcare application development. Here, we’ll go over what needs to be audited and what is considered an appropriate level of auditing. Our previous post on user authentication decodes the Security Rule as it applies to patient portal and […]

Read More
 

HIPAA and Healthcare Applications, Part 1 of 3: What You Need to Know About User Authentication

4.50 / 5 (2 votes)

Of the three main components of HIPAA — the Privacy Rule, the Security Rule, and the Breach Notification Rule — the Security Rule is one that is particularly relevant to health application development in the healthcare sphere. The majority of these applications, from patient portals to mhealth apps, store or transmit electronic Protected Health Information […]

Read More
 

Last updated by at .