Business Associates And HIPAA: Boston Medical Center Cuts Ties With Transcription Service Provider.

Boston Medical Center has cut ties with a vendor, a transcription company that they had been doing business with for 10 years, after the latter had a data breach, according to Over 15,000 patients were affected when their information was posted to a website operated and used by MDF Transcription Services (and its subcontractors). […] read more

HIPAA Laptop Encryption: Second Coordinated Health Data Breach In 30 Days.

Why is PHI encryption recommended by the HHS, Office for Civil Rights, HIPAA experts, and just people in general?  It’s because encryption software can act as a safety net for unforeseen data breaches, as the following story shows. Coordinated Health, a network of hospitals that has seventeen locations all over Pennsylvania, has announced a second […] read more

HIPAA Business Associate: Not Having A Written Agreement Is Grounds For Reporting A Data Breach.

When it comes to preventing HIPAA data breaches, one of the best ways of doing so is via the use of PHI encryption software.  However, there are so many aspects to the HIPAA Security Rule that sometimes it gets confusing.  For example, what happens if you violate one HIPAA rule while you have encryption in […] read more

Data Breaches: UK ICO Declines To Investigate Supposed Santander Email Breach.

The Information Commissioner’s Office in the United Kingdom has declined to investigate Santander, the Spanish banking group, for a purported data breach.  According to, people who’ve set up emails that are strictly used for correspondence with Santander are being spammed with junk mail, lending credence to the theory that the bank’s database was breached. […] read more

Kentucky Data Breach Law Signed.

The number of US states that haven’t signed a data protection law has dropped to three.  According to, the state of Kentucky is the latest state to sign a bill that is aimed at protecting personal data of Kentuckians.  Like many similar state laws, the use of data encryption provides safe harbor from reporting […] read more