5 Tips For Protecting Electronic PHI

05.08.14 In the News

By: Ayla Ellison | May 8, 2014 (Featured on Becker’s Hospital Review)

The HIPAA security rule data requirements expand beyond the security of physical computer servers to also cover the ways protected health information is accessed and transmitted to help prevent unauthorized third-parties from accessing electronic PHI.

Below are five tips from TigerText, a secure messaging provider, for protecting electronic PHI and complying with the HIPAA security requirements…

To read the full article, click here.