Jlhoffman Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, 27 July 2013

Encrypting PHI On Your Server And In-Transit

Posted on 13:56 by Unknown
Perhaps one of the most significant changes to the HIPAA Security Rules is the requirement for HIPAA Covered Entities and their Business Associates to provide notification in the event of any breach/exposure of unsecured/unprotected personal health information (PHI).  Who has to be notified?  Well, of course, you'll need to notify the affected individual(s) and the HHS, but you may also have to notify the police/authorities . . . and depending upon the size of the breach even the media and no one wants that kind of publicity!

HIPAA guidelines recommend all PHI should be encrypted "while in motion and at rest". 

What's PHI "In Motion"?
Simply put, if you send an e-mail (in motion) with PHI, it must be encrypted so that only the recipient can read it.  The same holds true for texting and IMing.  When you get any electronic communication, it should be stored in encrypted format or on an encrypted device.  Transferring PHI information from one location to another electronically?  Yes, indeed!  Moving data around on a Flash Drive?  Yup, encrypt it!  Notebooks with PHI should have the hard drives encrypted or at least the PHI files should be.  Un-protected notebooks with PHI exposed seem to be a leading point of exposure.  (Remember, statistically 1 in 10 notebooks are stolen each year.)

I was working with a C-Level executive at an extended care facility who, when I brought up texting as PHI in motion and the risks in a meeting said "Oh, we don't do that!" and his Director of Nursing corrected him saying "Oh, the nursing staff passes messages to each other all of the time that way!"  Don't just assume your staff doesn't pass PHI via text, e-mail or IMing.  Check first.  You may be surprised.

Let's talk about PHI data on your server.  (Data at Rest)
What about my server, you ask?  Servers can't be encrypted, can they?  The answer is a straightforward Yes, although your tech guys may be resistant because they've never done it before.  Most major data base programs like Microsoft SQL, MySQL and so forth have the built in capability to encrypt your data stored.  Current versions of Microsoft Server software also have the ability to encrypt the server hard drives or certain partitions of it that can store your PHI at a very high level that meets or exceeds HIPAA standards.

If I'm not absolutely required to encrypt my data bases on my servers, why should I bother?  The answer is spelled out very clearly in the HIPAA compliance requirements.  If you have a breach and it's "unprotected" by encryption, you're subject to all of the reporting requirements of the ACT(s) AND are subject to potentially significant fines.  If your breached data is "protected" by encryption, your not.   Seems like a pretty easy decision, doesn't it?

Would you like more information on this topic?  Here's a link to a nice article by the AMA:
http://www.ama-assn.org/resources/doc/psa/hipaa-phi-encryption.pdf
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Ransomeware Now #1 MalwareThreat - Learn More Here
    I just read an outstanding white paper from a couple of researchers at Sophos Security outlining how Ransomware is passing up FakeAlert malw...
  • Computer Support Rates - When Cheap Really Isn't
    What's in a labor rate?  Why are some IT companies more expensive than others?  Our company is neither the most expensive in our market ...
  • Server Configuration - Heaven Save Us From Well-Meaning Amateurs!
    How do I tell the client what their old tech did to them?  They've got to spend a bunch of money to correct the mess he made and I'm...
  • When It's Time To Fire A Customer
    What?  Isn't that backwards?  Isn't it the customer that usually does the firing? Usually, as business people, we work so hard to fi...
  • Using Personal Computers In the Workplace
    At ACT, we support a great many organizations that allow employees to use their own computers at work.  Sadly, I've noticed that some of...
  • What to do with Windows XP
    Well, it had a good long run.  Windows XP is now 13 years old.  In less than 10 months Microsoft is pulling the plug on our old friend XP.  ...
  • Wireless Networking Is Due For A Big Jump In Performance
    Just when we were getting comfortable with the 802.11n wireless standard, here comes a newer and better wireless solution - 802.11ac.  It wi...
  • Documentation - The Key To Client Support Success
    Recently, we won the trust of a new client that was unhappy with the service provided by their previous IT company.  After the client notifi...
  • Going to the Cloud is easy, getting out is a lot tougher!
    Everyone is pushing you to take your business to the cloud, right?  It's easy, right?  The sales rep used all the right words in his pit...
  • Support for Windows XP and Office 2003 stops on April 8th.
    All Microsoft support for Windows XP and Office 2003 stops on April 8th. What are the risks to your business if you don't upgrade? Let...

Blog Archive

  • ▼  2013 (39)
    • ►  November (3)
    • ►  October (4)
    • ►  September (2)
    • ►  August (4)
    • ▼  July (3)
      • Encrypting PHI On Your Server And In-Transit
      • WARNING - File Servers Don't Last Forever!
      • What The Heck Is Rootkit Malware?
    • ►  June (9)
    • ►  May (3)
    • ►  April (3)
    • ►  March (6)
    • ►  January (2)
  • ►  2012 (12)
    • ►  December (2)
    • ►  November (8)
    • ►  October (2)
Powered by Blogger.

About Me

Unknown
View my complete profile