Health IT and Electronic Health Activate your FREE membership today |  Log-in

Data Security for HIPAA Compliance:

June, 2010


June 25, 2010  5:20 PM

Out of band content on your network can contain phi that is not encrypted



Posted by: Azaltsman
electronic transcription, encryption, excel, microsoft word, powerpoint

So you're wondering what does "out of band" mean? In the world of computer networks we use that term to describe ways of connecting to devices outside of a computer network. For example, network routers are often programmed using Telnet or SSH, which is considered "in band" because those protocols...

June 25, 2010  4:08 PM

Do you know your state breach notification laws?



Posted by: Azaltsman
HIPAA, HIPAA Security Rule, pci compliance, phi, robert hudock, state breach notification laws

Almost every state in the nation has some sort of data breach notification law intended for companies domiciled in each state. Each state has its own definition of what constitutes private information. For example, the

Bookmark and Share     Comments are off for this post.     RSS Feed     Email a friend


June 25, 2010  3:27 PM

Do your backup tapes hold PHI that is not encrypted?



Posted by: Azaltsman
aes, backup tapes, data breach, des, disaster recovery, disk to disk backup, encryption, HIPAA, pgp, phi, symantec

Most organizations today use tapes as target media for data backup software. Although disk to disk and offsite backup technology has been around for many years companies continue to use backup tapes as their means for data and disaster recovery. A backup tape is a highly portable medium has the...


June 18, 2010  2:30 PM

Is PHI leaving your network and putting you at HIPAA and HITECH compliance risk?



Posted by: Azaltsman
data leakage prevention, DLP, encryption, hitech act

Electronic protected health information (PHI) lives on your network in many places: file shares, e-mail systems, databases, proprietary EHR, and practice management applications to name a few. It's important to understand where this data is stored on your network so that you can properly secure it....


June 9, 2010  12:49 PM

How HIPAA Security Rule Enforcement works



Posted by: Azaltsman
corrective action, enforcement, HIPAA Security Rule, hitech act, OCR, office of general counsel, resolution agreement

Marylou King from the U.S. Department of Health and Human Services (HHS) Office of General Counsel recently spoke at theĀ NIST 2010 HIPAA Security Conference about how the...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: