Can I or Did I Activate Full Device Encryption?

Screen Shot

What?: One of the strongest methods of protecting your information from confidentiality breaches is to encrypt it. “Full device encryption” is a kind of encryption dragnet that ensures that all the info on your device is encrypted regardless of whether you remember to encrypt it or not. This kind of encryption can also offer enhanced protection from liability under HIPAA…
See Also: HIPAA “Safe Harbor” For Your Computer
See Also Also: Digital Confidentiality Level II Course Syllabus

To access this content please click here to log in

Am I Synchronizing My Information With the Company That Produces My Device?

Screen Shot

What?: Oh how the times they are a-changin’: These days, most computer devices are built on the assumption that they are connected to the Internet. This is especially true in the case of mobile devices, which are built to rely on the constant connectivity to cellular data connections. This connectivity allows them to expand their information management capabilities by synchronizing important information with the servers of the company that built them. iPhones and iPads may synchronize with Apple (through iCloud), and Android phones may synchronize with Google. Those who touch protected health information with these devices may already see the potential dangers here…
See Also: How Do I Turn Off Oversharing Feedback on Windows 10?

To access this content please click here to log in

How Do I Know If I’m Using a Website With a Secured Connection?

Screen Shot

What?: When we connect to websites, our devices send information across the Internet. This information is normally visible to all and sundry who are in a position to observe the flow of your information. To deal with this, websites are able to offer a special kind of connection that encrypts your information while it is being sent across the Internet. If you are accessing Web pages that handle protected health information, you can see the value of this…
See Also: Digital Confidentiality Level I Syllabus
See Also: Is Gmail Encrypted?

To access this content please click here to log in

How Do I Know If I’m Using a Wi-Fi Network That Is Secured?

Screen Shot

What?: Wi-Fi networks are near-ubiquitous and can also be a significant source of vulnerability for protected health information that is either on computers using the Wi-Fi network or uploaded and downloaded using the Wi-FI network. There is a way to make Wi-Fi more reliable, however, and it is essential that clinicians who use Wi-Fi with equipment that touches protected health information know which Wi-Fi networks they can safely use and which ones they can’t.

To access this content please click here to log in

v1.25.06

Scheduled Maintenance

We will be temporarily taking the website offline at 10:00 PM Pacific (1:00 AM Eastern) tonight, July 6, in order to make some improvements. We plan to be back online by midnight Pacific (3:00 AM Eastern). We apologize for any inconvenience this may cause. Dismiss