
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"The \u2018What, Why, How and Who\u2019 of Data Encryption for HIPAA and Meaningful Use Compliance","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"byK4uhKXuV\"><a href=\"https:\/\/www.otava.com\/blog\/the-what-why-how-and-who-of-data-encryption-for-hipaa-and-meaningful-use-compliance\/\">The \u2018What, Why, How and Who\u2019 of Data Encryption for HIPAA and Meaningful Use Compliance<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/the-what-why-how-and-who-of-data-encryption-for-hipaa-and-meaningful-use-compliance\/embed\/#?secret=byK4uhKXuV\" width=\"600\" height=\"338\" title=\"&#8220;The \u2018What, Why, How and Who\u2019 of Data Encryption for HIPAA and Meaningful Use Compliance&#8221; &#8212; OTAVA\" data-secret=\"byK4uhKXuV\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Before law school, Brian Balow studied journalism for five semesters of his undergraduate years, so using an adaptation of the reporting axiom \u2018who, what, where, when, why and how\u2019 was a logical way to break down the points in his recent \u2018Tuesdays at 2\u2019 webinar, Removing the &#8216;Cryptic&#8217; from &#8216;Encryption&#8217; &#8211; HIPAA and the Meaning of Secure PHI. And because the former cum laude graduate of the University of Georgia School of Law is now a leading attorney concentrating his practice at Dickinson Wright PLLC in the areas of information technology \u2013 and a valued contributor to Online Tech\u2019s series of educational webinars \u2013 his arbitrary arrangement of that axiom was deemed admissible by the court of public opinion. Here is what you can expect to learn by viewing a replay of the 51-minute presentation about Protected Health Information (PHI) and data encryption as it relates to HIPAA and Meaningful Use compliance (available here): What (requires protection)? Why (is protection important)? How (should it be protected)? Who (should encrypt)? That\u2019s a lot of questions that need to be answered, something Balow noted when he was \u2018doing a little historical digging\u2019 into the legislative history and language around HIPAA in preparation...","thumbnail_url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/brian-balow.jpg"}