Datica Academy

HIPAA is complicated, but easily learned. The Datica HIPAA and Interoperability Academy walks you through the intricacies of HIPAA, HL7, and FHIR—from the highest concepts to the deepest details.

August 28, 2020

What is Protected Health Information (PHI)?

The acronym PHI stands for Protected Health Information. An individual's PHI is data on health status, provision of health care, or payment for health.

Ty Hollins

Information Security Officer

tag hipaa phi
August 3, 2020

HL7 201 - The Admission, Discharge, Transfer (ADT) Message

HL7 ADT message types are the most common HL7 messages. We explain ADT message structure, segments, and event types, including HL7 ADT message examples.

Rick Wattras

Engineering Director

tag hl7
June 7, 2019

Amazon ElastiCache for Redis HITRUST CSF Configuration Guide

This step-by-step guide gives developers easy-to-understand instructions to configure Amazon ElastiCache for Redis instances to be HITRUST CSF ready. In the following sections we walk through the requirements, controls, and configurations for ElastiCache for Redis.

Ryan Rich

Former Chief Product Officer

tag aws hitrust hipaa
March 11, 2019

API 101: A Layperson’s Guide: Part 2 – APIs and the New Digital Economy

The combination of service-oriented software architecture and robust, open APIs has made possible the transformation of huge swaths in the digital economy.

Dave Levin, MD

Co-Founder and Chief Medical Officer

tag api ehr
February 10, 2019

API 101: A Layperson's Guide

Learning from the rest of the digital economy, how can application program interfaces (APIs) have the same impact in health IT.

Dave Levin, MD

Co-Founder and Chief Medical Officer

tag api healthcare cloud ehr
November 7, 2018

Maturity Model Level Zero: Picking a Compliance DNA

In starting a compliance program, there is work to be done before you get to level one of the maturity model. We call this level zero.

Travis Good, MD

Co-founder & Former Chief Technology Officer

tag compliance hitrust
October 31, 2018

Steps to Climbing the Maturity Model

Getting started with compliance on the cloud is easiest if you have a stepwise approach like the 5-level maturity model outlined in this post.

Travis Good, MD

Co-founder & Former Chief Technology Officer

tag compliance hitrust
October 24, 2018

Artifacts and Why They Matter for Compliance

With all the attention on compliance and the need for compliance artifacts, or evidence, to be successful, it’s helpful to understand more about artifacts.

Travis Good, MD

Co-founder & Former Chief Technology Officer

tag cloud compliance
October 9, 2018

How to Optimize your Compliance Posture with a Maturity Model

In this guide, we will walk you through the reasoning, structure, and ways to leverage a maturity model, such as the HITRUST maturity model, to optimize your compliance posture.

Travis Good, MD

Co-founder & Former Chief Technology Officer

tag hitrust
October 2, 2018

Azure Cosmos DB Guide - How to configure Cosmos DB to comply with HIPAA and HITRUST

This guide is intended to give developers a simple way to configure their Cosmos DB service to be HITRUST CSF ready. In this guide we’ll walk through the requirements, controls, and configurations for Azure Cosmos DB.

Ryan Rich

Former Chief Product Officer

tag compliance hipaa microsoft
October 2, 2018

AWS RDS Guide - How to configure RDS to comply with HIPAA and HITRUST

This guide is intended to give developers an easy to understand, step by step runbook for configuring their AWS RDS instance to be HITRUST CSF ready. In the following sections we’ll walk through the requirements, controls, and configurations for RDS.

Ryan Rich

Former Chief Product Officer

tag aws hipaa hitrust
October 2, 2018

Google Cloud SQL Guide - How to configure GCP Cloud SQL to comply with HIPAA and HITRUST

This guide helps developers configure their Google Cloud SQL instance to be HITRUST CSF ready. It covers requirements, controls, and configurations for GCP Cloud SQL.

Ryan Rich

Former Chief Product Officer

tag cloud hipaa compliance
September 5, 2018

SOC 2 Type II Compliance for Cloud Computing

At Datica, we are often asked about SOC 2 Type II and how it relates to HIPAA and HITRUST. This article is to help explain how a SOC 2 Type II audit compares to HIPAA compliance and other regulatory audits in the United States.

Matt Taylor

Former Director of Marketing

tag compliance hitrust cloud
September 3, 2018

HL7 203 - The HL7 ORM (Order Entry) Message

The Order Entry (ORM) message is a common HL7 message type. ORM messages contain information about an order, most commonly radiology or lab orders.

Rick Wattras

Engineering Director

tag hl7 orm
August 30, 2018

HIPAA and Encryption

HIPAA encryption strategy is another factor of HIPAA compliance, whether HIPAA SSL, data at rest, Filevault2, firewall encryption, or more.

Ryan Rich

Former Chief Product Officer

tag hipaa
August 16, 2018

HIPAA, Subcontractors, and BAAs

The major part of security in healthcare is HIPAA, and the HIPAA rules changed in late 2013 with the new HIPAA Omnibus that adds subcontractors entities.

Travis Good, MD

Co-founder & Former Chief Technology Officer

tag hipaa
August 10, 2018

Integrating HL7 with a RESTful API

RESTful APIs are the backbone of many webservices today. Having the tools to integrate an not-natively-RESTful interface engine with this common standard opens a lot of possibilities. In the healthcare space, queuing the HL7 properly is critical. In this article, we explore ways to do this properly.

Mohan Balachandran

Former Co-Founder

tag hl7 mirth
July 23, 2018

HIPAA Data Retention Requirements

HIPAA requires that business associates and covered entities retain multiple types of data for at least six years. Learn what data you need to retain.

Ty Hollins

Information Security Officer

tag hipaa
July 18, 2018

MIPS Performance Qualifiers, Scoring, and Thresholds

High performance scores and ratings can be a strategic advantage over competitors. Understand MIPS, including qualifiers, scoring, and threshholds.

Kris Gösser

Former Chief Marketing Officer

tag company
June 28, 2018

HIPAA Auditing and Logging

If you're going through a HIPAA security audit by a hospital or payer compliance office, auditing and logging will show that your application is secure.

Ryan Rich

Former Chief Product Officer

tag hipaa

Page 1 of 3 (50 total entries)