icon

Hideez Blog | Identity Management News, Best practices & Tips

California Consumer Privacy Act 2020. What You Need to Know?

California Consumer Privacy Act

The California Consumer Privacy Act is effective on January 1st, 2020. This means that, in a little less than two months, California will be the first state to introduce a clear-cut and precisely defined privacy law. Intended to enhance privacy rights and consumer protection for the residents of the state of California, the CCPA takes a broad view of what constitutes private data.

Who needs to comply with HIPAA? Advantages & Limitations

Who needs to comply with HIPAA? Advantages & Limitations

Health Insurance Portability and Accountability Act of 1996 (HIPAA) was developed as an industry standard to ensure strong protection of personal healthcare information (PHI). Department of Health and Human Services (HHS) regulates HIPAA compliance, and the Office for Civil Rights (OCR) enforces it.w.

Data Privacy & Security in Healthcare. Who needs to Comply with HIPAA?

data protection in healthcare hippa
The Health Insurance Portability and Accountability Act (HIPAA) is one of the key documents for every CISO working in healthcare. Written over 20 years ago, long before smartphones, WiFI or Google were invented, it still regulates healthcare information security in the industry. Learn how it is applied nowadays to ensure secure medical care.

Authentication in NIST Cybersecurity Framework | Smart Grid Profile for Improving Critical Infrastructure

NIST Cybersecurity Framework
The U.S. electric power grid is modernizing through “smart” technologies. These changes bring a lot of benefits, but also a lot of potential cybersecurity risks. National Institute of Standards and Technology (NIST) recently published Smart Grid Profile.

Navigating HIPAA Authentication: Ensuring Compliance with Hideez

Navigating HIPAA Authentication: Ensuring Compliance with Hideez

There are many IT solutions on the market that can help healthcare organizations meet the security requirements for the Health Insurance Portability and Accountability Act’s (HIPAA) clauses on safeguarding protected health information (PHI). HIPAA’s security rule lays out specific administrative, physical, and technical components that are necessary for full compliance. .