10:55 AM
Dark Reading
Dark Reading
Products and Releases

New Free Software For Secure E-Mails, Attachments In Healthcare

JumbleMe encrypts e-mails and other electronically transferred information

PHILADELPHIA, April 26 /PRNewswire/ -- A new law that took effect in February calls for substantial new penalties on doctors for something they are doing every day - sending e-mails that include patient information, without encrypting the e-mail.

So, the doctor who answers a patient's e-mail asking for medical advice, and does it without encryption, is breaking the law, and is potentially subject to penalties and fines that can go as high as $1.5 million in a single year!

Many medical professionals remain unaware of the Health Information Technology for Economic and Clinical Health (HITECH) Act. According to this law, answering a patient's request for a test result, by unsecured e-mail, is a violation. Updating a patient's status, through an unsecured e-mail, is a violation. Sending an unsecured e-mail containing critical health-related information - even during an emergency medical situation - is a violation.

One doctor has developed a free solution to the new law's requirements: JumbleMe, a free software that encrypts e-mails and other electronically transferred information. JumbleMe complies with the new law and protects electronic information from fines that could prove disastrous for medical operations. The encryption protects e-mails and attachments whether they are sent through the Internet or via smartphones.

JumbleMe provides a number of features to ensure the confidentiality of e-mails. It allows medical professionals to encrypt e-mail via a password. Only the intended recipient can read the message. JumbleMe offers numerous enhanced features, including one that limits the number of times an e-mail can be read and another that sets an expiration date - when the e-mail disappears, forever. JumbleMe meets all HIPAA and HITECH Act requirements so that e-mails - and the medical professionals who send them - are protected.

JumbleMe was created by a doctor - Greg Hill, M.D. - for other doctors and medical professionals. Dr. Hill, a Philadelphia family practitioner, knows well the implications of the new regulations on his medical communications - and yours.

"As a doctor, I am just giving back to my peers," Dr. Hill said of offering the software, free, to medical practitioners. "This law impacts everyone in the medical field and finding a solution that helps us all seemed the right thing to do."

JumbleMe's standard software is free. To see a demonstration and to sign up for this free service, go to JumbleMe.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-03-25
Cross-Site Scripting (XSS) vulnerability in point_list.php in GNUBOARD5 before allows remote attackers to inject arbitrary web script or HTML via the popup title parameter.
PUBLISHED: 2019-03-25
A Cross-Site Scripting vulnerability in Fortinet FortiPortal versions 4.0.0 and below allows an attacker to execute unauthorized code or commands via the applicationSearch parameter in the FortiView functionality.
PUBLISHED: 2019-03-25
Multiple heap-based buffer overflow vulnerabilities exist in Honeywell Experion PKS all versions prior to R400.6, all versions prior to R410.6, and all versions prior to R430.2 modules, which could lead to possible remote code execution or denial of service. Honeywell strongly encourages and recomme...
PUBLISHED: 2019-03-25
Multiple stack-based buffer overflow vulnerabilities were found in Honeywell Experion PKS all versions prior to R400.6, all versions prior to R410.6, and all versions prior to R430.2 modules that could lead to possible remote code execution, dynamic memory corruption, or denial of service. Honeywell...
PUBLISHED: 2019-03-25
Telegram Desktop before 1.5.12 on Windows, and the Telegram applications for Android, iOS, and Linux, is vulnerable to an IDN homograph attack when displaying messages containing URLs. This occurs because the application produces a clickable link even if (for example) Latin and Cyrillic characters e...