HIPAA Advice

HIPAA and Patient Telephone Calls

The Federal Communication Commission has released a Declaratory Ruling and Order to clarify TCPA rules in relation to HIPAA and patient telephone calls. Some healthcare suppliers have had difficulty understanding TCPA rules in relation to […]

HIPAA Updates

44,600 Patients Affected by Ransomware Attack at Golden Heart Administrative Professionals

AK-based billing company, Golden Heart Administrative Professionals, a Fairbanks is alerting 44,600 people that some of their protected health information has potentially been obtained by unauthorized people due a recent ransomware attack. The ransomware was […]

HIPAA Advice

Microsoft Outlook and HIPAA Compliance

Software or an email application platform can never be completely HIPAA compliant, as compliance is dependent on how the software is being used rather than the software itself. However, software and email services can make […]

HIPAA Updates

Potential Theft of 4,500 Patients’ PHI BY Former Arkansas Children’s Hospital Employee Being Reviewed

A former staff member of Arkansas Children’s Hospital is being investigated by law authorities in relation to the theft and misuse of patients’ protected health information. The breach notice submitted to the Department of Health […]

HIPAA Advice

HIPAA Certification Explained

Many suppliers would like HIPAA certification to confirm they are fully compliant with HIPAA Rules and are knowledgeable with all parts of the Health Insurance Portability and Accountability Act (HIPAA), but can HIPAA certification be […]


First GDPR Ruling Issued in German Courts

Last Monday (July 9) a German court, in the first decision applying the General Data Protection Regulation (GDPR), ruled that data collection that exceeds what is necessary to achieve legitimate business purposes breaches one of the basic […]

HIPAA Updates

Humana Reports Cyber Spoofing Attack

Humana is contacting members across the US to notify them that their PHI may have been been accessed during a ‘sophisticated’ spoofing campaign. A spoofing attack refers to a concerted effort by a threat actor […]