Tuesday, October 26, 2010

Three tips for facilitating HIPAA Compliance

The Healthcare Insurance Portability and Accountability Act (HIPAA) has communities a reality for the medical and insurance companies since 1996, representing a higher level of accountability to the patients concerned with the transmission and storage of medical data related to. These data, as to which HIPAA Protected Health Information and Electronic Protected Health Information (Ephi) requires that protected information remains confidential and that it discloses noUnauthorized parties. Otherwise Ephi can back out in court proceedings, lost profits, and fines for the offending business.

As communications technology has evolved, so has HIPAA, causing problems for many IT departments. Many of the technological tools available today at work, such as laptops, removable media and wireless networks with specific threats to HIPAA. As a result, organizations must access toInformation, not a problem within a traditional office setting, but in an organization with remote employees or wireless capabilities to solve complex.

Fortunately, in the last two years of software solutions from companies such as Safend have arisen, the organizations can continue to use productivity tools, while the highest level of information security. These solutions work from information from unauthorized data transmission or "leak"ensure integration into existing enterprise architectures, and that virtual security holes are included.

may Regardless of what technical tools you provide, there are three essential steps to minimize the information leakage and to facilitate HIPAA:

1. Evaluate possible data leaks

The first step in a security planning exercise is to evaluate the outstanding
Vulnerabilities in the network. This is not only a good practice is to a HIPAA
Requirement. This process involves running a network auditing tool that allows system administrators to use the endpoints to collect information from all company PC or laptop () and provide a comprehensive list of which machines, ports and connections. Identify which compounds are used and how they are used (file transfer activity vs. entertainment) is extremely important in locating vulnerabilities and possible leaks in an organization> Network.

2. Access permissions

Once you have determined where your weaknesses are and what devices, connections and ports are open and for the use, development of a specific plan to create the action level for specific users and types of data. For example, a temporary staff need the same level of information access as a product manager? Who can work from home information be download? What types of storageDevices may use them? Which remote network allows employees to login to the Corporate and areas in which they are to be allowed access to? Your new plan must access levels that meet the specific requirements of HIPAA for your company relevant.

3. Application and enforcement of compliance policies

Once you have found and sent to Corporate Access level, they count on your organization endpoints (laptops, PCs, etc.). The access rights of usersshould be monitored regularly as HIPAA required to ensure that measures are met. Software will be installed to enforce the policies at the endpoint by limiting the flow of information from the endpoint to external data destinations. For example, a Medicare billing clerk will be allowed access to an electronic patient record chart, while the Human Resources team will be denied access to these files. Constraints can with a particular device, connection will be assigned, or by file. Ideally, softwarebe used to enforce compliance with policy collects logs and generate reports, recording each instance of attempted access, each activity restricted, and the transmission of data. Such tools will assist in the provision of information and trail of accountability to different teachings of HIPAA.

Final Analysis

With the help of data protection solutions that address end-point vulnerabilities complete HIPAA and they may be integrated with existing organizational access rightsInformation flow control. The three-stage approach tackled the difficult task of ensuring, that data leakage has a minimal impact on HIPAA and offers tools to the protective aspects and audit requirements to administer the regulation. In addition, rapidly deployable technical controls can be easily integrated into existing policies. Without this type of endpoint security strategy, organizations face serious cracks developed in any infrastructure that HIPAA compliant.

Thanks To : !: Purchase 46 Lcd Tv !: Purchase White Living Room Furniture !: Cheap Paint Living Room Furniture !8!# Egyptian Vase Order Now



No comments:

Post a Comment