Patient Portal Hosting for Security, Compliance and Development

5 / 5 (1 votes)

Most HIPAA compliant cloud hosting services don’t do a very good job of making considerations for the application or website they’re hosting. This creates a disconnect between developers and systems administrators, putting more pressure on the system administrators to customize the environment to support the software, which they likely don’t understand perfectly. This also creates […]

Read More

Understanding the Move to Mobile and HIPAA

5 / 5 (2 votes)

According to a 2015 Statista study, approximately 81 percent of doctors use their smartphones for professional purposes. And the results of another study revealed that 64 percent percent of doctors surveyed use text messaging to send and receive patient data among colleagues, such as patient diagnoses, test results, and medical advice. There’s no question that […]

Read More

Three Things About HIPAA That You Probably Didn’t Know

4.75 / 5 (4 votes)

More and more health organizations are implementing publicly-exposed web technologies containing Protected Health Information (PHI) which are subject to the laws of HIPAA. Common examples of such systems include Electronic Health Record (EHR), web portal, Patient Portal and mHealth solutions. When those systems become integrated, PHI must travel from one platform to the other – […]

Read More

HIPAA and Healthcare Applications, Part 3 of 3: What You Need to Know About Data Transfer

3.50 / 5 (2 votes)

We’ve come to the final installment of our three-part series decoding the Security Rule section of HIPAA in connection with healthcare application development. This rule’s detailed guidance on the degree to which the transmission and storage of electronic protected health information (ePHI) must be kept safe makes it especially relevant to patient portal and mHealth […]

Read More

HIPAA and Healthcare Applications, Part 2 of 3: What You Need to Know About Auditing

4.50 / 5 (2 votes)

This is the second part of our three-part series discussing the Security Rule section of HIPAA compliant messaging in  healthcare application development. Here, we’ll go over what needs to be audited and what is considered an appropriate level of auditing. Our previous post on user authentication decodes the Security Rule as it applies to patient […]

Read More

HIPAA and Healthcare Applications, Part 1 of 3: What You Need to Know About User Authentication

4 / 5 (4 votes)

Of the three main components of HIPAA — the Privacy Rule, the Security Rule, and the Breach Notification Rule — the Security Rule is one that is particularly relevant to health application development in the healthcare sphere. The majority of these applications, from patient portals to mhealth apps, store or transmit electronic Protected Health Information […]

Read More