Malicious actors want your data, and will actively scan networks in order to discover vulnerabilities. Once they know your network’s weaknesses, they attempt to penetrate the network and gain unauthorized access in order to abuse the system in some way. Abuse may include stealing your data or using the compromised system as part of their … Continue reading Vulnerability Scans Should be Required for HIPAA Hosting
HIPAA and PCI DSS are both frameworks for complying with legal guidelines that ensure the underlying data is protected appropriately. So what are the differences? Whereas HIPAA is focused on protecting Protected Health Information (PHI) or Electronic Health Records (EHR), PCI-DSS is centered around an individual’s credit card data. HIPAA is the Health Insurance Portability … Continue reading Differences Between PCI DSS Compliance & HIPAA Compliance
It’s pretty easy to understand that the confidential data must be protected because it is confidential information. However, the question remains of ‘where’ and ‘when’ should the data be protected.
Protected Health Information must be encrypted according to HIPAA $164.312 Technical safeguards. At first glance this seems obvious even to a casual observer. PHI data must be encrypted because it contains the private health records of a patient, and this private information must be carefully safeguarded. It’s easy to understand that the confidential data must … Continue reading Protected Health Information – What, When, Where, Why
HIPAA is the legislature that was proposed by Senators Kennedy and Kassebaum and signed into law by President Clinton in 1996. Title II, a standard of electronic health care transactions This section defines a national standard by which companies that are transacting in Protected Health Information must follow. Protected Health Information or PHI What is … Continue reading HIPAA Fundamentals