encryption Archives - Page 2 of 2 - Veterans Press, Inc.

avatar New California Breach Notification Law: HIPAA & HITECH Act Blog by Jonathan P. Tomes

Governor Jerry Brown recently signed into law a California bill regarding breach notification, A.B. 2828, amending California Civil Code §§ 1798.29(a) and 1798.82(a) so that, .. read more

avatar Illinois Joins California in Affording More Protection to Personal Information: HIPAA & HITECH Act Blog by Jonathan P. Tomes

In May, the Governor of Illinois, Bruce Rauner, signed amendments to the Illinois Personal Information Protection Act (“PIPA”), 815 ILCS 530/1 et seq., expanding the .. read more

avatar Latest HIPAA Violation Settlement–$850,000 for a Stolen Laptop: HIPAA & HITECH Act Blog by Jonathan P. Tomes

I don’t understand why, with all the high six-figure and seven-figure resolution agreements (basically, settlements), covered entities do not provide adequate security for laptops and .. read more

avatar Does DHHS Expect Email Encryption? HIPAA & HITECH Act Blog by Jonathan P. Tomes, along with guest commentator Brent Sadler, CIO at Veterans Press

One of our HIPAA clients/customers asked the following question through our Veterans Press website: “We have clients’ identifiable information that needs to be sent via .. read more

avatar Some Good News and an Apology: HIPAA & HITECH Act Blog by Jonathan P. Tomes

The good news is that I purchased Richard Dvorak’s half interest in Veterans Press and its wholly owned subsidiary, EMR Legal (the consulting arm of .. read more

avatar Are Passwords Sufficient Equivalent Alternate Measures to Encryption? HIPAA & HITECH Act Blog by Jonathan P. Tomes with Guest Commentator Michael B. O’Hara

I was recently asked a question by national HIPAA expert Jon Tomes concerning whether or not medical professionals should encrypt hard drives on their laptops .. read more

avatar Can You Encrypt an iPad? HIPAA & HITECH Act Blog by Jonathan P. Tomes

A client recently asked me whether her organization could encrypt iPads that contained PHI. The answer is yes. Encryption, of course, is an addressable implementation .. read more

avatar It’s a HIPAA Breach. Now What?

Again, as promised, what follows are the answers to questions 9 and 10 posed in the previous blog item posted November 19, 2012, and titled .. read more

seo by: k.c. seo