The Facts about HIPAA and Email/SMS Communication with Patients

As more healthcare providers begin to use email and text (SMS) messaging to communicate with patients, concerns about the HIPAA Security Rule and how it applies to electronic messaging have increased as much as the confusion has. HIPAA law makes very few specific statements about what is and isn’t acceptable when it comes to electronic […]

Read More
 

Understanding the Acronym Puzzle: What Health Professionals Need to Know About C-CDAs, CDAs, and CCDs

For more than a decade, healthcare institutions have been using electronic health records (EHRs), as well as standardized templates for files containing medical information, in order to share data electronically.  By 2011, the number of physicians using EHR systems had grown to 57% – and since then, with the introduction of the federal government’s EHR […]

Read More
 

How Poor User Experience Fuel Third Party Patient Portal Vendors

It pays to keep patients happy, and many certified patient portal vendors just aren’t cutting it. While this is mostly the result of software vendors focusing solely on Meaningful Use/MACRA requirements, it also has to do with vendors not investing sufficient resources in research and development (R&D), and in simply making band-aid fixes instead of […]

Read More
 

Avoid High Interface Costs & Pushback From EHR Vendors PART 1

  Interoperability is necessary for the attainment of a more efficient healthcare system and the use of HIEs. It puts important patient data at physicians’ fingertips, allowing for more informed decision-making and better continuity of care. Interoperability is on the rise, spurred by government efforts to increase health information exchange; however, barriers by EHR vendors […]

Read More
 

HIPAA and Healthcare Applications, Part 3 of 3: What You Need to Know About Data Transfer

We’ve come to the final installment of our three-part series decoding the Security Rule section of HIPAA in connection with healthcare application development. This rule’s detailed guidance on the degree to which the transmission and storage of electronic protected health information (ePHI) must be kept safe makes it especially relevant to patient portal and mHealth […]

Read More
 

HIPAA Compliant Healthcare Applications, Part 2 of 3: What You Need to Know About Audits In Healthcare

This is the second part of our three-part series discussing the Security Rule section of HIPAA compliant messaging in healthcare application development. Here, we’ll go over what needs to be audited and what is considered an appropriate level of auditing. Our previous post on user authentication decodes the Security Rule as it applies to patient […]

Read More
 

HIPAA Compliant Healthcare Applications, Part 1: What You Need to Know About User Authentication

Updated on July 23, 2020. Of the three main components of HIPAA (the Privacy Rule, Security Rule, and Breach Notification Rule) the Security Rule is particularly relevant to healthcare mobile app development. The majority of these applications, from patient portals to mhealth apps, store or transmit electronic protected health information (ePHI). It’s essential to keep […]

Read More
 

How Bridge Improves Patient Engagement for McKesson Users

Many of the today’s leading health information technology organizations that offer a full suite of solutions, such as McKesson, are on a general trend of developing less and less software.  As these organizations dedicate fewer resources to maintaining their previous developed software it makes it hard to trust in these organizations as long term partners, […]

Read More