HIPAA Compliant Hosting

HIPAA API Explained – Should You Set Up an API for Your Healthcare App or Service?

  • HIPAA APIs and The Rise of HIPAA-Compliant Mobile
  • The Essence of HIPAA Compliance
  • An API as a HIPAA Compliance Tool

HIPAA APIs and The Rise of HIPAA-Compliant Mobile

Why set up a HIPAA-compliant API? The third platform of cloud-delivered mobile allows users to pull in data from various locations (whether stored anywhere online or locally) so that they are operating with real-time knowledge. Although all IT decisions must be particularly conscientious in healthcare both because of compliance and the acceleration of hacking, wearables and other smart devices continue to grow in popularity – and setting up a HIPAA-compliant API could help you protect patient health information while also providing authorized access to vital health data.

Read More


HIPAA Compliant File Storage

How can you take advantage of the incredible power of cloud hosting while still meeting HIPAA data storage requirements at all times?

The best way currently available to store your medical files and share them between various parties is with HIPAA compliant cloud storage. Various cloud apps are designed for filesharing (examples include Box, Dropbox, and Google Drive), which also allows you to back up the files and synchronize data between various devices. However, general technological solutions are not designed for the special case of healthcare – in particular with regard to encryption.

Read More


What Is the Penalty for a HIPAA Violation? Can You Get Jail Time?

  • Example of HIPAA Violation
  • Legislative Basis
  • Consequences of HIPAA Violations – Civil Penalties
  • HIPAA Criminal Penalties – Can You Be Imprisoned?
  • Covered Entities & Individual People
  • “Knowingly”
  • Exclusion & Upholding the KLaw
  • Choosing a Compliance Partner

Example of HIPAA Violation

Those who follow Healthcare IT news will often see stories about large HIPAA settlements by the US Department of Health & Human Services, such as the $4.8 million HIPAA fines against Columbia University and New York Presbyterian Hospital in early 2014. No situation is the same, and not all settlements will be as severe as that one. In the Columbia University case, PHI was actually posted to the public Internet, with patient files accessible directly through search engines.

Read More


What is Protected Health Information?

If you are active in US healthcare, you probably know that the Health Insurance Portability and Accountability Act of 1996 (HIPAA) safeguards protected health information, a.k.a. PHI. What is protected health information exactly?

  • Protected Health Information Definition
  • 18 Identifiers of PHI
  • Research Examples of Protected Health Information
  • Partners in PHI

Protected Health Information Definition

What is PHI? The reason that the concept of protected health information (PHI) exists is really to clarify the parameters of HIPAA. It delineates the specific type of data that is protected by the law.

Read More


Is RDP (Remote Desktop Protocol) HIPAA Compliant?

  • Remote Desktop Protocol and HIPAA Compliance
  • Client Needs System for Nationwide Remote Desktop
  • Perspective of Complete Healthcare Solutions
  • Security Increasingly Critical in Healthcare

RDP and HIPAA Compliance

Remote desktop protocol (RDP) can be made HIPAA compliant with the help of a HIPAA-compliant hosting company. Healthcare security and HIPAA compliance are points of focus for us at Atlantic.Net. Here is a sample chat we had with a prospective client interested in setting up nationwide access to a compliant system via remote desktop protocol (RDP).

Read More


A Story About a HIPPAA-Compliant Website & Mobile App

Dell strategist Jim Stikeleather has argued that big data projects should tell a story. He said that by thinking in a similar manner to journalists, data scientists can more deliberately and captivatingly frame and communicate the information and filters they want to explore.

Storytelling can assist with understanding of any situation, particularly technology – which often can seem obtuse, boring, and inhuman. Obviously, people breathe life into technological situations – as when stories are told of people problem-solving using the tools of the technological era.

Read More


Ensuring Cloud Compliance In Regulated Industries

  • Why is Cloud Computing Worth the Effort for Regulated Companies?
  • What Are You Up Against?
  • What Can You Do to Adopt Cloud Effectively?
  • Partners that Understand Compliance

The businesses that run into the most difficulties when transitioning to cloud computing solutions are those that are strictly regulated, such as finance and healthcare. What are the challenges? How can they be overcome? And why is the effort worth it?

Let’s start with the last of those questions.

Read More


The HIPAA Compliant Cloud: An Introductory Report

More and more healthcare companies are evaluating the cloud as a possible environment for data processing and storage. As more investment has been pumped into the cloud industry, systems have become substantially more robust and complex. However, federal law dictates that providers, health plans, and health data clearinghouses must keep all “protected health information” (PHI) secure and confidential – and the role of technology providers is critical.

“The HIPAA Omnibus Rule had several changes in how CEs and business associates could handle patient data,” explains Elizabeth Snell of HealthIT Security, “and what the ramifications will be if that data is compromised in a data breach.”

Read More


Sharp Focus on HIPAA: Breach Notification Rule

Hacking news at the top of 2015 is driving the Health Insurance Portability and Accountability Act of 1996 (HIPAA) into the limelight. The news – that the second largest insurer in the United States, Anthem, was breached, resulting in the compromise of 78.8 million patient records – makes the HIPAA breach notification rule more relevant.

Many are aware that the Final Omnibus Rule of 2013 modified the law so that business associates are now effectively considered covered entities, but how does that designation apply to notifications? In other words, what does anyone who handles sensitive protected health information (PHI) have to do post-hack in terms of alerting clients, the press, and the HHS?

Read More



New York, NY

100 Delawanna Ave, Building 1

Clifton, NJ 07014

United States

San Francisco, CA

2820 Northwestern Pkwy,

Santa Clara, CA 95051

United States

Dallas, TX

2323 Bryan Street,

Dallas, Texas 75201

United States

Orlando, FL

440 W Kennedy Blvd, Suite 3

Orlando, FL 32810

United States

London, UK

14 Liverpool Road, Slough,

Berkshire SL1 4QZ

United Kingdom

Toronto, Canada

20 Pullman Ct, Scarborough,

Ontario M1X 1E4

Canada