Skip to main content

Compliance & Legal

Compliance
By Jessica Davis | 03:37 pm | May 25, 2018
The European regulation is much more stringent than HIPAA, and those health systems that handle EU patient data, even in the U.S., must adjust their privacy measures to comply.
Compliance
By Jessica Davis | 02:57 pm | May 25, 2018
While only about 6,500 patients were impacted by a cyberattack on Associates in Psychiatry and Psychology in March, the provider's transparency in its breach notification is a valuable example for other organizations.
Compliance
By Jessica Davis | 12:28 pm | May 25, 2018
In March, the Internet Engineering Task Force approved the Transport Layer Security version 1.
Analytics
By Mike Miliard | 05:30 pm | May 23, 2018
The dashboard can help health systems manage the stringent privacy rules of the EU's looming General Data Protection Regulation, which goes into effect this week.
Compliance
By Mike Miliard | 05:37 pm | May 22, 2018
Security organizations just made it easier and more effective for hospitals to deploy and operate the dominant infosec frameworks.
Compliance
By Mike Miliard | 01:24 pm | May 21, 2018
Supreme Court sides with Epic and other employers over workers in the May 21 decision, with Justice Neil Gorsuch writing the 5-4 majority opinion.
Analytics
By Bill Siwicki | 02:21 pm | May 18, 2018
The Domain-based Message Authentication, Reporting and Conformance standard can help hospitals protect against ransomware and phishing, but is only successfully used by 1.7 percent of large healthcare organizations.
Compliance
By Jessica Davis | 02:47 pm | May 08, 2018
Inspector general says Defense Health Agency sites failed to consistently implement technical, physical and administrative protocols and may have violated HIPAA regulations in the process.
Compliance
By Tom Sullivan | 12:33 pm | May 07, 2018
U.S. government got approximately $125 million out of the False Claims case but what about eClinicalWorks customers?
Compliance
By Jessica Davis | 12:46 pm | May 04, 2018
While gap analysis can find existing vulnerabilities in an organization’s security, it’s not an equal substitution for HIPAA-required risk analysis.