Best Practices: Emailing Patient Records in Compliance with HIPAA

Best Practices: Emailing Patient Records in Compliance with HIPAA 1024 403 maxon1212

In January 2016, the HIPAA regulation got more teeth in the area of providing patients their medical records on request (files, notes, diagnostic images, lab results, C-CDAs). The US Department of Health and Human Services published detailed FAQs regarding patients rights with…

read more

What Exactly is a HISP?

What Exactly is a HISP? 1024 403 maxon1212

A Health Information Service Provider (HISP) is an authorized network service operator that enables nationwide clinical data exchange based on Direct Secure Messaging, a HIPAA compliant and interoperable transport method promoted by the Office of the National Coordinator of Health IT of the US…

read more

DataMotion™ Direct Healthcare Provider Directory (HPD)

DataMotion™ Direct Healthcare Provider Directory (HPD) 1024 403 maxon1212

The rapidly growing number of healthcare professionals with Direct addresses underscores the need for subscribers to discover Direct addresses assigned to specific individuals and organizations. Direct Secure Messaging has the power to enable interoperable health information exchange between disparate systems, but…

read more

What are Open APIs and FHIR for Health Information?

What are Open APIs and FHIR for Health Information? 1024 403 maxon1212

The use of Open APIs is a relatively new form of secure data sharing in clinical healthcare. API stands for Application Programming Interface, and allows the health care provider to expose data on the web so correspondents can download it…

read more

Best Practices: Securing Data at Rest, in Use, and in Motion

Best Practices: Securing Data at Rest, in Use, and in Motion 1024 403 maxon1212

Sensitive business data is more vulnerable today than ever before. Corporate trade secrets, national security information, personal medical records, Social Security and credit card numbers are all stored, used, and transmitted online and through connected devices. This proliferation of valuable…

read more

Is TLS email encryption good enough?

Is TLS email encryption good enough? 1024 403 maxon1212

As most people are aware, the need for secure messaging, email encryption or email compliance is on the mind (or should be) of almost all managers inside every business. The need for TLS (Transport Layer Security) can vary from avoiding…

read more

Gmail TLS Email Encryption – is it good enough?

Gmail TLS Email Encryption – is it good enough? 1024 403 maxon1212

Major cloud email services such as Gmail and Yahoo Mail announced their use of TLS about two years ago (TLS is transport layer security – a type of encryption that can be applied to email transmissions). Both services announced they…

read more

Opportunistic TLS – Two Good Ways to Put Your Email at Risk

Opportunistic TLS – Two Good Ways to Put Your Email at Risk 1024 403 maxon1212

Email encryption allows organizations to protect sensitive messages and increase their compliance with privacy regulations.  One common encryption method, known as opportunistic TLS, automatically tries to secure the path that messages take when they travel to recipient email systems.  Since…

read more

Salesforce Service Cloud and HIPAA Compliance

Salesforce Service Cloud and HIPAA Compliance 1024 403 maxon1212

Q: My company sells to the healthcare industry.  Is it a HIPAA violation when my Customer Service Rep replies to a support ticket on Service Cloud?  I mean, Salesforce is HIPAA compliant, right? A: You very well may be in…

read more

Is Encryption Enough to Protect Yourself?

Is Encryption Enough to Protect Yourself? 1024 403 maxon1212

With the increase in cybercrime over the past few years, many internet users have turned to encryption in an effort to protect themselves online. Businesses are no exclusion; well-known companies have experienced data breaches within the same time frame and…

read more

How safe are HTTPS connections? Not as safe as you think.

How safe are HTTPS connections? Not as safe as you think. 1024 403 maxon1212

One of the pillars of internet security has fallen, and until it’s universally fixed, hackers will have the upper hand. When making an online purchase, any reputable website will require a secure HTTPS connection before requesting payment information and completing…

read more

Achieve Office 365 CJIS Compliance

Achieve Office 365 CJIS Compliance 1024 403 maxon1212

Moving from an on-premises Exchange server to Microsoft Office 365 (O365) can have numerous benefits. Microsoft promotes its cloud productivity suite to yield better collaboration, increased productivity and a reduced cost of ownership.  Many state and local government agencies eager…

read more

Adding a Secure Message Center to Self-Service Portals and Apps

Adding a Secure Message Center to Self-Service Portals and Apps 1024 403 maxon1212

Self-service started long ago with things like the self-service gas pump (1947) and automated teller machine (1967) – primarily for economic reasons. Self-service often helps to reduce the cost of doing business, and when it comes to digital self-service –…

read more

Major Email Compliance Regulations That You Need to Know

Major Email Compliance Regulations That You Need to Know 1024 403 maxon1212

Keeping up with industry and government email compliance regulations impacting the exchange of sensitive information can be exhausting. So, we’ve put together a list of four big ones you need to know about. Payment Card Industry Data Security Standard (PCI…

read more

Direct Secure Messaging

Direct Secure Messaging 1024 403 maxon1212

What is Direct?Direct is a national encryption standard for securely exchanging clinical healthcare data via the Internet. It is also known as the Direct Project, Direct Exchange and Direct Secure Messaging. It specifies the secure, scalable and standards-based method for…

read more