HIPAA Security: Don’t Decrypt Data Before You Destroy It?.

HIPAA experts know that there are only two ways to obtain safe harbor for PHI: encrypt it or destroy it.  Seeing how it’s hard to work with destroyed data, most opt to use PHI encryption software to protect their patients’ sensitive information from unauthorized access. However, the rules also clearly state that any data that […] read more