The Security Rule operationalizes the protections contained in the Privacy Rule by addressing the technical and non-technical safeguards that organizations called “covered entities” must put in place to secure individuals’ “electronic protected health information” (e-PHI)
Quick overview of the main differences between HIPAA and SOC 2 compliance frameworks.
Risk assessments, security questionnaires, vendor due diligence, and RFPs are strategic initiatives for organizations managing risk across growing and interconnected supply chains.
This article contains a summary of all mandatory and non-mandatory policies required by ISO 27001.
The blog post provides a short description of the ISO 27001 Annex A – controls.
NIST Cyber Security Framework (CSF) gives private sector organisations a framework of policies and controls to help prevent attacks from cyber criminals and detect and respond to ones that do gain access.
Overview The California Consumer Privacy Act (CCPA) was enacted in 2018 to give California consumers greater control over their personal information and to increase transparency
In this quick blog post we go over the timeline and events associated with the HIPAA act.
Get email alerts when we publish new blog articles!