by jeremy@bondbyte.com | May 24, 2024 | KeyNotes
HIPAA compliance doesn’t have formally defined “levels” per se, but organizations can achieve compliance in varying degrees of thoroughness and sophistication based on their specific needs and resources. Compliance can generally be categorized based...
by jeremy@bondbyte.com | May 24, 2024 | KeyNotes
Protected Health Information (PHI) refers to any information that is created, received, stored, or transmitted by a covered entity or its business associate, which relates to the past, present, or future physical or mental health or condition of an individual, the...
by jeremy@bondbyte.com | May 24, 2024 | KeyNotes
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 is a critical piece of legislation that affects how healthcare information is managed and protected. From a software application perspective, the essence of HIPAA involves several key elements: 1....
by jeremy@bondbyte.com | Jan 4, 2024 | Uncategorized
This assumes you’ve followed my other blog post about creating a docker environment with a network, Nginx Reverse Proxy and LetsEncrypt NginX Reverse Proxy Companion. #Restore Script #Do this on the host. It will unballz the files. # Find and Replace these...
by jeremy@bondbyte.com | Dec 30, 2023 | Uncategorized
Here’s a handy shell script to get the backup part going. We will need to create the script inside the Docker WordPress Front End and another on the WordPress Docker Backend. We will need to use docker cp on the host to copy the backup files out of the...