HIPAA Blog Archives - Page 14 of 15 - webdesign2.hipaavault.com
HIPAA Blog, Resources

HIPAA Compliant Hosting for European-based Organizations

In order to host and/or migrate medical data being transferred from the European Union (EU), US hosting providers have to undergo and partake in the U.S.-EU Safe Harbor certification process. EU Directive 95/46/EC is the European Union mandate (in conjunction with the European Convention {EC}) for the protection of individuals with regard to Automatic Processing... Continue reading
HIPAA Blog, Resources

HIPAA Compliant Hosting vs Standard Web Hosting

If you host a website that will interact with patient information, then you should find a HIPAA specialist in web hosting. Patient information is considered Protected Health Information (PHI) or Electronic Health Records (EHR) and is protected by the regulations of the Health Insurance Portability and Accountability Act (HIPAA).
HIPAA Blog, Resources

Security Scanning for HIPAA Compliant Hosting: Pen Testing and Vulnerability Assessments

Why should I scan my systems? How often should I scan? What is the difference between internal scanning vs external scanning?These are common security questions that should be addressed when dealing with HIPAA Compliance regulations. HIPAA regulations require that procedures exist for the safekeeping of data, with high recommendation on data encryption. The HIPAA Security Rule states that a Risk Analysis is required for systems that contain electronic protected health information (ePHI). This involves conducting an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability (also known as the CIA triad) of the resident information.
HIPAA Blog, Resources

Why HIPPA Compliant Hosting Providers Should Hire a CISSP

Regulatory Compliance | Risk Assessment | Information Assurance | Password Management When providing services to HIPAA clients, guidelines have to be followed and rules put into place; this requires someone that can manage these restrictive measures and become intimately familiar with the processes involved. Professionals who have obtained the CISSP credentials possess this knowledge, with... Continue reading
HIPAA Blog, Resources

Differences Between PCI DSS Compliance & HIPAA Compliance

HIPAA and PCI DSS are both frameworks for complying with legal guidelines that ensure the underlying data is protected appropriately. So what are the differences? Whereas HIPAA is focused on protecting Protected Health Information (PHI) or Electronic Health Records (EHR), PCI-DSS is centered around an individual’s credit card data. HIPAA is the Health Insurance Portability... Continue reading
HIPAA Blog, Resources

Protected Health Information – What, When, Where, Why

Protected Health Information must be encrypted according to HIPAA $164.312 Technical safeguards. At first glance this seems obvious even to a casual observer. PHI data must be encrypted because it contains the private health records of a patient, and this private information must be carefully safeguarded. It’s easy to understand that the confidential data must... Continue reading