Copyright Telerad Tech 2009. RADSpa. HIPAA Compliance



Similar documents
CHIS, Inc. Privacy General Guidelines

White Paper. BD Assurity Linc Software Security. Overview

An Introduction to HIPAA and how it relates to docstar

WISHIN Pulse Statement on Privacy, Security and HIPAA Compliance

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.

Accessing the Media General SSL VPN

CONTENTS. PCI DSS Compliance Guide

H.I.P.A.A. Compliance Made Easy Products and Services

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

CareGiver Remote Support Information Technology FAQ

Spreed Keeps Online Meetings Secure. Online meeting controls and security mechanism.

Wellesley College Written Information Security Program

Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI

Introduction to HIPAA Compliance Checklist:

Electronic Prescribing of Controlled Substances Technical Framework Panel. Mark Gingrich, RxHub LLC July 11, 2006

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

HIPAA Privacy & Security White Paper

Healthcare Compliance Solutions

LogMeIn HIPAA Considerations

FileCloud Security FAQ

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications VIDYO

How Managed File Transfer Addresses HIPAA Requirements for ephi

Connecting an Android to a FortiGate with SSL VPN

Policy Title: HIPAA Access Control

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Cisco SSL Encryption Utility

WebEx Security Overview Security Documentation

ITUS Med Solutions. HITECH & HIPAA Compliance Guide

RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER

WHITEPAPER XMEDIUSFAX CLOUD FOR HEALTHCARE AND HIPAA COMPLIANCE

E-Signature. The Pharmacy Perspective

VoIP Logic HIPAA/SSAE SOC II Compliance Overview for Service Providers

Enterprise Security Interests Require SSL with telnet server from outside the LAN

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

LAB FORWARD. WITH PROService REMOTE SERVICE APPLICATION. Frequently Asked Questions

Remote Desktop Access for the Mobile Workforce

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

HIPAA. considerations with LogMeIn

Unit 6 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.

Procedure Title: TennDent HIPAA Security Awareness and Training

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Instructions on TLS/SSL Certificates on Yealink Phones

MOBILE GAMING SYSTEM POLICIES

PRIVACY, SECURITY AND THE VOLLY SERVICE

Clever Security Overview

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

WebEx Remote Access White Paper. The CBORD Group, Inc.

epaces Overview HIPAA Strategy for New York Medicaid Health Insurance Portability and Accountability Act - 02/09/2006 Go ahead, we re listening.

Protected Trust Setup Guide for Brother MFC Devices

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

USING GENIE REMOTELY

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

Joe Dylewski President, ATMP Solutions

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version and higher

HIPAA Security Series

ProjectManager.com Security White Paper

Secure Frequently Asked Questions

Division of Information Technology Lehman College CUNY

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

HIPAA The Law Explained. Click here to view the HIPAA information.

TOP SECRETS OF CLOUD SECURITY

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

C.T. Hellmuth & Associates, Inc.

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Xerox SMart esolutions. Security White Paper

Directed Circuits Meet Today s Security Challenges in Enterprise Remote Monitoring. A White Paper from the Experts in Business-Critical Continuity TM

HIPAA Compliance and Wireless Networks Cranite Systems, Inc. All Rights Reserved.

SSL VPN Setup for Windows

White Paper Instant Messaging (IM) HIPAA Compliance

What is an SSL Certificate?

Security Considerations

Introduction to Cyber Security / Information Security

Internet Privacy Options

OpenHRE Security Architecture. (DRAFT v0.5)

Nine Network Considerations in the New HIPAA Landscape

Account Restrictions Agreement [ARA] - Required by LuxSci HIPAA Accounts

Hosted Microsoft Exchange Client Setup & Guide Book

Transcription:

RADSpa HIPAA Compliance

1. Introduction 3 1.1. Scope and Field of Application 3 1.2. HIPAA 3 2. Security Architecture 4 2.1 Authentication 4 2.2 Authorization 4 2.3 Confidentiality 4 2.3.1 Secure Communication 4 2.3.2 Encryption 4 2.4 Non-Repudiation 4 2.4.1 Data Audit 4 2.4.2 Event Audit 4 2.5 Safeguards 5 2.5.1 Physical Safeguards 5 2.5.2 Technical Safeguards 5 3. HIPAA Compliance 6 3.1 Privacy Rule 6 3.1.1 Data at Rest 6 3.1.2 Data in Transit 6 3.2 Security Rule 6 3.2.1 Audit Trail Error! Bookmark not defined.

1. Introduction 1.1. Scope and Field of Application This document explains how RADSpa complies with HIPAA regulations. It elaborates architecture and design decisions that ensure compliance with the HIPAA act 1.2. HIPAA According to the Centers for Medicare and Medicaid Services (CMS) website, Title I of HIPAA protects health insurance coverage for workers and their families when they change or lose their jobs. Title II of HIPAA, known as the Administrative Simplification (AS) provisions, requires the establishment of national standards for electronic health care transactions and national identifiers for providers, health insurance plans, and employers. The Administration Simplification provisions also address the security and privacy of health data. The standards are meant to improve the efficiency and effectiveness of the nation's health care system by encouraging the widespread use of electronic data interchange in the U.S. health care system.

2. Security Architecture 2.1 Authentication Users have to be authenticated to access patient data in RADSpa. User passwords are one-way encrypted and stored in the database. 2.2 Authorization Upon authentication, RADSpa checks if users are allowed to access patient data. This check is based on static roles provided to users and/or dynamic roles associated with other attributes of the patient data (e.g. patient s medical images) 2.3 Confidentiality 2.3.1 Secure Communication All patient data transmitted to and from RADSpa servers and RADSpa clients are encrypted using 128-bit SSL or TLS. Data displayed on the browser is transmitted using HTTPS protocol. Images are transmitted either via secure VPN (from point to point) or through TLS ports. 2.3.2 Encryption All sensitive patient data and user passwords (to access patient data) are encrypted and stored in the database 2.4 Non-Repudiation All user actions related to patient data are audited. This ensures non-repudiation. There are 2 kinds of audits 2.4.1 Data Audit Data audit captures a trail of changes made to patient-related data including Data changes Who changed it When was it changed 2.4.2 Event Audit All events related to patient data (e.g. viewing study etc.) are logged in an event tracker database.

2.5 Safeguards 2.5.1 Physical Safeguards The location where the RADSpa product is manufactured and tested is controlled and restricted to only those involved in the software design, development and testing. In addition, servers are hosted in secure data centers where access is restricted. All systems and desktops have strong passwords and are always locked when not in use. All systems run anti-virus software and they are updated on a periodic basis. 2.5.2 Technical Safeguards Access to features in RADSpa is governed by roles provided to the users. Roles define whether the user can view and perform actions on patient data.

3. HIPAA Compliance 3.1 Privacy Rule 3.1.1 Data at Rest Patient data stored in RADSpa falls under 2 categories Patient metadata: This is stored in database and can be accessed only by a user who is authorized to access patient data Medical images: Stored in the file system and can be accessed only by authorized users 3.1.2 Data in Transit All patient data transmitted from RADSpa servers to RADSpa clients (like browsers) and to other systems is via SSL or TLS protocol only 3.2 Security Rule Access to RADSpa patient data to authenticated users is protected based on physical and technical safeguards mentioned in the previous section