morgan_truevault

12 Articles

Blue Cross Blue Shield Provider Anthem Hacked

Anthem Inc., provider of Blue Cross and Blue Shield health insurance, revealed…

morgan_truevault morgan_truevault

What Is Protected Health Information?

Protected Health Information, or PHI, is the personally identifiable health information that…

morgan_truevault morgan_truevault

Top mHealth Apps for September

Apps continue to grow in importance for smartphone users, as more people…

morgan_truevault morgan_truevault

Apple’s HealthKit vs. Google Fit [INFOGRAPHIC]

The field of mHealth has never been hotter as more people add…

morgan_truevault morgan_truevault

What Is HIPAA Compliant Hosting?

  According to security guidelines established by HIPAA (the Health Insurance Portability…

morgan_truevault morgan_truevault

5 Things CIOs Should Do in Light of the Recent Patient Records Theft

Community Health Systems, which manages 206 hospitals in 29 states, reported this…

morgan_truevault morgan_truevault

What’s Next for Wearable Technology and What It Means for Health Data

Wearable technology has rapidly moved from fantasy to geeky fad, and is…

morgan_truevault morgan_truevault

HIPAA Violations are on the Rise [INFOGRAPHIC]

Over the past year, consumer complaints to the Office of Civil Rights…

morgan_truevault morgan_truevault

Should App Developers Get HIPAA Certified?

If you are a developer and you create apps, software, or other…

morgan_truevault morgan_truevault

5 Pitfalls Mobile App Developers Face with HIPAA Compliance

The Health Insurance Portability and Accountability Act was signed into law by…

morgan_truevault morgan_truevault