H.I.P.A.A. Compliance Made Easy Products and Services



Similar documents
Client Security Risk Assessment Questionnaire

Supplier Security Assessment Questionnaire

Print4 Solutions fully comply with all HIPAA regulations

INCIDENT RESPONSE CHECKLIST

U06 IT Infrastructure Policy

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

74% 96 Action Items. Compliance

ICANWK406A Install, configure and test network security

INTRODUCTION TO FIREWALL SECURITY

Copyright Telerad Tech RADSpa. HIPAA Compliance

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

Security Technology: Firewalls and VPNs

Best Practices For Department Server and Enterprise System Checklist

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

NET ACCESS HIPAA COMPLIANT FLEXCloud

STREAM FRBC

Payment Card Industry Self-Assessment Questionnaire

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Cisco Advanced Services for Network Security

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Network Security Administrator

White Paper. BD Assurity Linc Software Security. Overview

JOB OPENING. Please see attached Job Description: Last day to apply: February 27, 2013

CISCO IOS NETWORK SECURITY (IINS)

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Small Business IT Risk Assessment

Network Security Guidelines. e-governance

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

Firewalls. Chapter 3

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Remote Infrastructure Support Services & Managed IT Services

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Electronic Prescribing of Controlled Substances Technical Framework Panel. Mark Gingrich, RxHub LLC July 11, 2006

How To Manage Your Information Systems At Aerosoft.Com

How are we keeping Hackers away from our UCD networks and computer systems?

Information Technology Security Procedures

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

PCI DATA SECURITY STANDARD OVERVIEW

IT Security in Higher Education Survey Questionnaire

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

Log Audit Ensuring Behavior Compliance Secoway elog System

Network Security: A Practical Approach. Jan L. Harrington

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

PCISS-1. Job Description: Key Responsibilities: I. Perform troubleshooting& support:

Achieving PCI-Compliance through Cyberoam

PCI Requirements Coverage Summary Table

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

ICAB5238B Build a highly secure firewall

Supplier Information Security Addendum for GE Restricted Data

SonicWALL PCI 1.1 Implementation Guide

F-SECURE MESSAGING SECURITY GATEWAY

MANAGED SECURITY SERVICES

HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures

Basics of Internet Security

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

How To Write A Health Care Security Rule For A University

Network and Security Controls

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

Network Detective. HIPAA Compliance Module RapidFire Tools, Inc. All rights reserved V

Setting Up Scan to SMB on TaskALFA series MFP s.

INE 2810 Lab Version 1.1

Configuration Example

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Global Partner Management Notice

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Chapter 1 The Principles of Auditing 1

SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan

Fortinet Solutions for Compliance Requirements

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

custom hosting for how you do business

FIREWALL POLICY November 2006 TNS POL - 008

Vendor Audit Questionnaire

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Silent Safety: Best Practices for Protecting the Affluent

Step-by-Step Configuration

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Module 5 Introduction to Processes and Controls

IBX Business Network Platform Information Security Controls Document Classification [Public]

Developing Network Security Strategies

MCSA Objectives. Exam : TS:Exchange Server 2007, Configuring

Backup with synchronization/ replication

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Information Technology Security Standards. Effective Date: November 20, 2000 OFM Guidelines for Economic Feasibility Revision Date: January 10, 2008

PCI Requirements Coverage Summary Table

Network Configuration Settings

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

Transcription:

H.I.P.A.A Compliance Made Easy Products and Services Provided by: Prevare IT Solutions 100 Cummings Center Suite 225D Beverly, MA 01915 Info-HIPAA@prevare.com 877-232-9191

Dear Health Care Professional, Prevare IT Solutions has simplified your organization s concerns regarding the HIPAA Compliance Law. We have a four-step program in which we address all of your current communication process followed by a cost effective solution to implement the appropriate technology solutions that comply with HIPAA regulations. Prevare is a complete solutions provider and will help manage your systems on a regular basis. We will deploy the appropriate appliances at your location with all reasonable safeguards considered prior to implementation. These solutions will bring your organization in compliance and also have the ability to communicate directly with third parties with minimal effort in the future. Please fill out the two forms enclosed (the organizational profile and the technical assessment), of your current systems or call one of our technical staff to assist. Fax request for HIPAA Gap Analysis to: Prevare LLC Fax: 978-232-9630 Info-HIPAA@prevare.com

100 Cummings Center, Suite 225D, Beverly, MA 01915 HIPAA Compliance Prevare LLC, a leading IT outsourcing and IT security company, located in Beverly, Massachusetts, is pleased to offer our services to address your HIPAA issues with: HIPAA Compliance Solutions Systems Integration IT Support Managed Services The process consists of: Step one: Step two: Step three: Step four: Gap Analysis We will do an examination of your electronic information systems focusing on the security of information flow. We will submit a report outlining your HIPAA compliance status. Technology Plan We recommend a step-by-step solution for achieving HIPAA compliance, tailored to your business needs and budget. Implementation We will work with your staff and computer systems to ensure that the Technology Plan is successfully implemented. On-going Support We will be there to train your staff and keep your systems in compliance. Begin your journey to HIPAA compliance with a phone call or e-mail to: Prevare IT Solutions (978) 232-9191 info-hipaa@prevare.com phone: (978) 232-9191 toll free: (877) 232-9191 fax: (978) 232-9630 e-mail: mail@prevare.com www.prevare.com

Gap analysis evaluation Objective To provide your organization with a simple and affordable solution that will comply with HIPAA guidelines. Prevare will review all of your current information technology systems, security hardware, software, and infrastructure. We will evaluate the method in which you currently transmit patient data electronically and identify any gaps and deficiencies in accordance with the HIPAA regulations. At this juncture, we can make the appropriate recommendations for a secure HIPAA compliant environment. We will conduct a thorough network audit of all hardware and software and create a map of your current network layout and IP structure. Prevare will identify any server, software, and security configuration changes that will help you become HIPAA compliant. In a client-server environment, employees should be able to easily access and share information and files which pertain to their day-to-day operations. This includes the ability of all users to review, create, change, and forward communications to any appropriate third party. The primary goal will be to eliminate the deficiencies, and deploy secure methods for all of your electronic communication. Project Outline Prevare s security team will completely evaluate your current computer network and systems resources in order to propose a system configuration that will accommodate all desired functionality with minimal hardware and software changes. There may be some additional software and hardware required to transmit patient data securely in a HIPAA compliant environment. We will evaluate all third party communications and deploy secure technology for all remote users. Third party billing, transcriptions, EDI, referrals, prescriptions, second opinions, etc will all be transmitted according to HIPAA guidelines. Prevare will be able to provide a list of hardware and software with firm pricing, and a timeline for deployment. A complete and detailed report will be generated to show these recommendations.

Gap analysis evaluation Page 2 of 2 HIPAA review will include detailed examination, analysis, and testing of the following: Security and disaster recovery analysis of the buildings Servers and applications running Desktops O/S and configurations OS/Apps/Hardening server/desktops Modems Antivirus(desktop/server/gateway) Firewall/VPN(border, departmental, desktop) Software security Proxy, NAT, RAS Directory services configurations Use authentication permissions Backup/Disaster recovery infrastructure Patch status for server OS and Desktop OS Data encryption(vpn/remote software) Intrusion detection systems Content Filtering products Event logging and monitoring High availability (clustering/load balancing) 802.11b WLAN Business continuity planning Physical security and access to your facilities Prevare takes great pride in customer satisfaction and in our technical resources, which will help insure that your network operation will be a success for many years to come. Please call me with any questions or changes regarding this proposal. I look forward to working with your organization in the near future. Thank You, Prevare Technical Team Prevare LLC 100 Cummings Center Suite 225D Beverly, MA 01915 877-232-9191 info-hipaa@prevare.com

HIPAA GAP Analysis Client Questionnaire The Administrative Simplification Compliance Act (ASCA) amended HIPAA allows covered entities to apply for a one-year extension, as long as they submit a compliance plan by October 15, 2002. MedSafe clients: print this form, complete the information and fax it to Prevare LLC at: 978 232 9630. If you have any questions, please call Prevare LLC at: 978 232 9191. Company Name: Address 1: Address 2: City, State ZIP: Phone number: Fax Number: Public IP address: DNS address: Web Site URL: Email Address: Other Remote Access: Contact Name 1: Title: Preferred Contact Method: Tax ID #: Medicare ID #: Type of Entity: Health Care Clearinghouse Health Plan Health Care Provider IT Provider Contact: Preferred Contact Method: Hours of Operation: Other Locations/Offices: Directions:

HIPAA GAP Analysis Client Questionnaire Continued Confidential Passwords and means of access: Note: The information requested on this page is required for our engineer to perform your HIPAA Gap Analysis audit. Please gather this information and make it available to our engineer when he arrives on-site. Administrator accounts NT domain/workgroup login Firewall login Router login local admin login database admin login Unix login Other application login 1 Other application login 2 User-level account: Locations of server room or office keys:

100 Cummings Center, Suite 225D, Beverly, MA 01915 What are Managed Services? Managed Service Provider and Managed Security Service Provider The simple explanation is a company that can deliver information to multiple customers over a network on a subscription basis. A managed service provider delivers network services such as antivirus updates on a regular basis, email tracking and content filtering, instruction detection, VPN encryption services, authentication certificates, Firewall, incident monitoring, and off-site tape backup. Strategy and tactics for a security policy? Corporate standard of conduct security process definition risk management risk mitigation cost vs loss authority to act incident reporting and escalation procedures critical information back-up and recovery system and network monitoring oversight change management. Authentication Services Services offered under this heading are: review architecture and requirements determine applicable technology AAA PKI-digital certificate, secure ID protocol design, test and implement new technology. Virus Protection Services Services include: Network perimeter virus protection clean up SMTP, HTTP AND FTP internet traffic host and server virus protection/exchange email, attachments, shared files, on-line service all automatic updated virus protection desktop virus protection automatic updates forced to the desktops. Firewall Security Protect your network perimeter by restricting network protocols and traffic: Application gateways (proxy servers) Stateful inspection Intrusion detection Virus filtering Identification Site-to-site Firewall and VPN Packet filtering Incident monitoring and response Web content filtering Recurring scanning Remote client VPN access 24x7 monitoring Prevare has the infrastructure in place and can offer you all of the necessary services to get your organization HIPAA compliant. Call our sales representative for services and costs that will fit your needs. phone: (978) 232-9191 toll free: (877) 232-9191 fax: (978) 232-9630 e-mail: mail@prevare.com www.prevare.com

Organization Profile for: Please take a few moments to tell us about your organization. This will assist us in assessing the scope of your HIPAA compliance needs. Thank you for your time. Yes No Section One Do the doctors or partners work from home? Does your organization use third party transcription? Does your organization use third party billing? Does your organization use third party referrals? Do you have remote users at home offices? Would you like remote ability from home? Do you transmit payments electronically? Do you accept credit card payments? Do you use on-line banking How do you move patient records? Electronically Courier Mail Fax Patient pickup Do you use specific medical software? Please list below: Do you use their technical support? Do you use email? Do you use the Internet for business? Do you have a policy to protect patient records and information? Do you understand managed services? Yes No Section Two Do you have a network? Do you have Internet access? Do you have a web site? Home page: Do you have IT staff? How many? Do you outsource any IT functions? Do you have a technology plan? Do you budget for medical software and support? Do you budget for IT? Does your staff use computer resources? Do they need training? Have you had computer viruses? Do you understand managed services?