• Reset
Slack and HIPAA

Slack for Healthcare—Do’s, don’ts, & best practices

So, you’re a healthcare organization that’s started using Slack? Chances are, you want to help your employees communicate and collaborate more effortlessly, and you’ve heard on the grapevine that Slack is the collaboration tool to use. We’ve heard the same. Slack adoption is soaring. The company generated $902 million in revenue between March 2020 and […]

read more
Cloud security

What is autonomous compliance?

The world of compliance is evolving at an astounding rate. It seems like there’s a new regulation every year. Plus, with the advent of state compliance laws, companies will soon have to deal with a myriad of shifting expectations around how they deal with consumer data.  On top of this, frameworks like ISO 27001 and […]

read more
hipaa remote work

How is HIPAA being upgraded for remote work?

It’s been a long time since there’s been any update to the Health Insurance Portability and Accountability Act (HIPAA). But, this year, things are going to change with new additions to the HIPAA privacy rule expected to be announced in the coming months. Read on to discover how HIPAA will evolve this year and what […]

read more
cloud DLP for PHI

5 ways cloud DLP helps secure PHI

The healthcare sector has a problem. It’s trying to innovate, embrace new ways of working and adopt the cloud. To an extent, it’s doing this successfully but, then, when we look at data breach figures we see that, for many companies, this innovation is coming at a cost. For the last ten years, the healthcare […]

read more
HIPAA SaaS compliance

Is SaaS HIPAA compliant?

SaaS tools must be used in accordance with HIPAA to be compliant.

read more

Hiring a compliance analyst? 5 traits to look for

A good compliance team can make the difference between a company that is successful vs not. Risks related to reputation, enterprise, technology, people, third party are just some of the areas that a compliance team gets involved in. Finding the right candidate is challenging but keeping these traits in mind can help look for good […]

read more
cloud security challenges

Cloud security challenges of privacy policy management

Becoming data-driven is a critical priority for organizations of all shapes and sizes. Data, combined with analytics, equals insights – and these insights can form the basis of predictions, better customer relationships and informed decisions. However, in the modern world, generating data insights comes with great responsibility. A lot of data, after all, relates to […]

read more
hipaa privacy rules

HIPAA privacy rules for non-covered entities

HIPAA data governance extends beyond doctors and healthcare providers to most entities providing services in the healthcare area. Understanding the role and responsibilities of the service providers is essential. The American Medical Association (AMA) now requires non-HIPAA-covered entities to protect sensitive Patient Health Information (PHI) they collect. In this third blog of our HIPAA blog […]

read more
electronic health records HIPAA

Electronic health records: necessary security safeguards

Second in our HIPAA blog series, this post takes a closer look at HIPAA’s technical safeguards. For starters, there are five technical safeguards as outlined in the HIPAA Security Rule.  The primary purpose of these safeguards is to help healthcare providers ensure that electronic Protected Health Information (ePHI) is safe from data breach and security-related […]

read more
hipaa

HIPAA deep dive series: when is patient authorization not needed for sharing personal data?

HIPAA has strict rules governing patient data storage and sharing. However in limited circumstances, the HIPAA Privacy Rule allows a covered entity to use or disclose a patient’s Protected Health Information (PHI) without prior written authorization.  First in our series of HIPAA in-depth blog posts, this piece looks at circumstances under which you don’t require […]

read more
what is sensitive data

What is sensitive data?

Every time you sign up for a new service, buy something online or, even apply for a job, you automatically share your personal information. If you look back over the hundreds of online interactions you’ve had over the years, it gives you an inkling as to how many businesses have processed information about you. Then, […]

read more

Subscribe to Polymer blog