Clarify what does and does not qualify as PHI under HIPAA, so you can effectively secure and protect patient information.
Is it PHI? Get the Decision Tree
Submit this form to get your free PHI decision tree.
by Sarah Badahman | Jun 21, 2018 | Security
In 2012-2013, the University of Texas MD Anderson Cancer Center had three data breaches involving unencrypted devices. An unencrypted laptop had been stolen from an employee’s home, and they had lost two unencrypted USB thumb drives. These incidents compromised the...Submit this form to get your free PHI decision tree.
Enter your details and we will email it to you!
Enter your details and we will email it to you!
Enter your details and we will email it to you!
Enter your details and we will email it to you!
Enter your details and we will email it to you!
Enter your details and we will email it to you!
Just enter your information to get your free BA Decision Tree.
Enter your details and we will email it to you!