GETTING STARTED SECURE FILE TRANSFER PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures



Similar documents
Molina Medicaid Solutions EDI Unit sftp Companion Guide 9/5/2012

Please note that a username and password will be made available upon request. These are necessary to transfer files.

CBH Provider EDI Browser Manual

Moveit DMZ User Manual

Instructions For Opening UHA Encrypted

Using LCC s media web server to store files

ClicktoFax Service Usage Manual

Accessing the FTP Server - User Manual

HMRC Secure Electronic Transfer (SET)

Encryption. How do I send my encryption key?

Overview of edx Analytics

How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)

Erie 1 BOCES/WNYRIC. Secure File Transfer. Upload/Download Wizard

GENERAL FILE TRANSFER GUIDELINES

MSGCU SECURE MESSAGE CENTER

Business Internet service from Bell User Guide

Reading an sent with Voltage Secur . Using the Voltage Secur Zero Download Messenger (ZDM)

Google Trusted Stores Setup in Magento

Receiving Secure from Citi For External Customers and Business Partners

Tutorial: Encrypted with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)

How To Open An Encrypted

AVTranz The Court Record Online (TCRO) Operating Instructions Vermont Court System

Quick Start Guide. Hosting Your Domain

SECURE COMMUNICATIONS PLAN Updated August 25, 2011

How to setup Electronic Claims

FTP Use. Internal NPS FTP site instructions using Internet Explorer:

Montefiore Portal Quick Reference Guide

Can I manually trigger secure to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID.

Secure File Transfer Protocol Updated Procedures. June 20, 2011

Mimecast Services for Outlook (MSO4)

Secure Mail Registration and Viewing Procedures

Encryption User Guide

OCAN - Ontario Common Assessment of Need

Air Resources Board File Transfer Protocol (FTP)

6. Is it mandatory to have the digital certificate issued from NICCA? Is it mandatory for the sender and receiver to have a NIC id?...

FTP Accounts Contents

File Transfer with Secure FTP

DSI File Server Client Documentation

Use your UNNCNetID and password to log in. The first time you login to the system, you may receive the following screen:

User Guide. The AMF's File Transfer Service (FTS)

Green Climate Fund Online Accreditation System: User s Guide

Welcome to the TransPerfect Translations Secure File Transfer Website What is Secure FTP?

Secure Frequently Asked Questions

PDG Software. Encryption Guide

eadvantage Certificate Enrollment Procedures

Using Internet or Windows Explorer to Upload Your Site

This document provides a brief, end-user overview of the Cisco Registered Envelop Service which has been implemented by Sterne Agee.

LiteCommerce Advanced Security Module. Version 2.8

Secure User Guide Receiving Secure from Merchants Bank

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide

Your Archiving Service


Law School Computing Services User Memo

Global TAC Secure FTP Site Customer User Guide

Methods available to GHP for out of band PUBLIC key distribution and verification.

Encryption Key Best Practices Nasuni Corporation Natick, MA

Secure Data Transfer

Experian Secure Transport Service

IIS, FTP Server and Windows

How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro

SFTP Server User Login Instructions. Open Internet explorer and enter the following url:

Overview Keys. Overview

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Gateway

Setting Up Microsoft Outlook 2007 with GroupWise

DSHS Secure FTP Instructions

Using Voltage Secur

WinSCP: Secure File Transfer Using WinSCP for Secure File Transfer on Windows

Guide to the Configuration and Use of SFTP Clients for Uploading Digital Treatment Planning Data to IROC RI

Managed Devices - Web Browser/HiView

File Share Service User guide

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

IBM Aspera Add-in for Microsoft Outlook 1.3.2

Marcum LLP MFT Guide

SchoolBooking SSO Integration Guide

E-LEARNING STUDENT S MANUAL

educ Office Remove & create new Outlook profile

An Introduction to Secure . Presented by: Addam Schroll IT Security & Privacy Analyst

How to Add or Change a Billing Agent and Other Claim Submission Options in NCTracks

Microsoft OneDrive. How to login to OneDrive:

8x8 Click2Pop User Guide

How to install and use the File Sharing Outlook Plugin

Clearswift Information Governance

Ad Hoc (Temporary) Accounts Instructions

FAQs. OneDrive for Business?

HIPAA Transaction ANSI X Companion Guide

EDGETECH FTP SITE CUSTOMER & VENDOR ACCESS

Secure User Guide

Schools Remote Access Server

EDI Insight Manual. Training Manual. Presented By

Installation Guide. Before We Begin: Please verify your practice management system is compatible with Dental Collect Enterprise.

PayFlex FTP - Wired Commute

Accessing the Media General SSL VPN

Outlook Data File navigate to the PST file that you want to open, select it and choose OK. The file will now appear as a folder in Outlook.

Commport FTP Client Set-up

Configure Backup Server for Cisco Unified Communications Manager

Secure Client User Guide Receiving Secure from Mercantile Bank

Redtail CRM Integration. Users Guide Cities Digital, Inc. All rights reserved. Contents i

Transcription:

A. Secure File Transfer Protocol (SFTP) Procedures Overview IEHP utilizes our Secure File Transfer Protocol (SFTP) server to conduct all electronic data file transactions. Some of the benefits to using the SFTP are: 1. SFTP is a standard protocol for file transfer. SFTP is a universally used tool for securely exchanging files between entities. 2. SFTP provides additional security. A username and password must be used to establish a connection and data is encrypted during transmission. Each provider has their own credentials to ensure file transmissions are secure and can be tracked. 3. SFTP is more flexible. Files placed on the SFTP server are available until they are picked up. The SFTP server can be accessed 24 hours a day, 7 days a week. Files remain on the SFTP server until they are deleted. They can be re-accessed multiple times and do not have to be retransmitted. 4. SFTP complies with HIPAA requirements. Every file that is transmitted to IEHP is encrypted and password protected. File Transfer Procedures All files for Eligibility, Encounter data, Capitation, and Claims submission must be exchanged via the SFTP using the formats described in: Section III - Eligibility Processing Procedures Section IV - Encounter Processing Procedures Section V - Capitation Processing Procedures Section VI - Claims Processing Procedures The SFTP server can be accessed via a web browser, but there are several graphical user Interface (GUI) based SFTP client programs available as well. Examples of these include WS_FTP, FileZilla, and CoreFTP. SFTP functionality may also come bundled into other software products such as Microsoft SSIS and WRQ Reflection. Since the use of an SFTP client varies from vendor to vendor, we are providing instructions for using the internet browser web interface only. SFTP Internet Browser Web Interface 1. Open your web browser (e.g. Internet Explorer, Chrome, and Firefox). 2. Navigate to the web address https://sftp.iehp.org/. 3. In the login prompt, enter the SFTP credentials given to you by IEHP, typically based on your provider ID. 4. Click the Sign On button to view your home screen. IEHP Provider EDI Manual 07/15 II-1

A. SFTP Procedures 1. Downloading Click on the Folders link on the left to see your home directory from where you can navigate to the different subfolders that are used for posting and receiving different kinds of data files. For some of the file formats, an OpenPGP standards compatible encryption program like GPG (GNU Privacy Guard) or PGP (Pretty Good Privacy) may be necessary. Note: IEHP may occasionally place messages on the SFTP server that will appear when you log in, please pay attention to these messages as they may direct you to download a new file or processing schedule. DOWNLOAD FILES FROM IEHP ELIGIBILITY 1. From your home directory click the ELIG subfolder link. 2. In the ELIG subfolder you will find the eligibility file(s) that are ready for download. 4. Remember that eligibility files will be encrypted using your public key. An encryption program will be needed to decrypt the files locally using your private key. DOWNLOAD FILES FROM IEHP CLAIMS STATUS RESPONSE 1. From your home directory click the Claims subfolder link, then from the Claims folder list, click the outbound subfolder link. 2. In the outbound subfolder you will find the claims response file(s) that are ready for download. This will include both 997/999 acknowledgements, 277 status files, and potentially 835 remittance files. To receive 835 files, you must specifically request enrollment. DOWNLOAD FILES FROM IEHP CAPITATION 1. From your home directory click the CAP subfolder link. 2. In the CAP subfolder you will find the Capitation file(s) that are ready for download. 4. Remember that capitation files will be encrypted using your public key. An encryption program will be needed to decrypt the files locally using your private key. IEHP Provider EDI Manual 07/15 II-2

A. SFTP Procedures 2. Uploading UPLOAD FILES TO IEHP ENCOUNTER DATA 1. From your home directory click the encounter subfolder link. 2. At the bottom of the screen, use the Upload a File Now function to select which local files to upload. 3. If uploading multiple encounter files, make sure the Upload files individually option is selected. This will ensure that files are not grouped into one archive file for upload. Remember, the encounter folder is for the submission of encrypted encounter files only. UPLOAD FILES TO IEHP CLAIMS SUBMISSION 1. From your home directory click the Claims subfolder link, then from the Claims folder list, click the inbound subfolder link. 2. At the bottom of the screen, use the Upload a File Now function to select which local files to upload. 3. If uploading multiple files, make sure the Upload files individually option is selected. This will ensure that files are not grouped into one archive file for upload. Remember, the claims/inbound folder is for the submission of claims files, only. IEHP Provider EDI Manual 07/15 II-3

Introduction B. Encryption Questions and Answers With some of our transactions, file encryption is utilized to ensure security. IEHP has chosen GNU Privacy Guard (GPG) as our encryption program, but there others also available that take advantage of the OpenPGP standards, like PGP. These are very powerful and fairly easy to use packages that are transportable across several popular platforms. There are many levels of security that can be employed. Both commercial and open source software packages based on the OpenPGP Standard can be found. Examples include PGP at http://www.pgp.com/ or GPG at http://www.gnupg.org/. Installation and Configuration See documentation provided with your software. Generating Private and Public Keys OpenPGP standard encryption is dual key encryption containing a Private key and a Public key. The Private key is kept secure and will be used to decrypt files received. The Public key is given to the data file sender. The sender uses the Public key to encrypt the data files for transmission. Once the data is encrypted with the Public key, not even the sender can view it. The Private key is now required to decrypt it ensuring that only the intended file recipient will be able to access the data. IEHP will need to receive a Public key from each trading partner. If you do not already have a key pair set up, you will need to generate them. Typically you will need to enter a name, an email address, and a pass phrase (longer then a password) to generate your key pair. Share your Public key with IEHP by emailing it to edi@iehp.org or post it to your home directory on our SFTP. Decrypting A File Once you have downloaded an encrypted file posted by IEHP, the process of decrypting can vary depending on your encryption software. 1. Typically, you can right click on the file and select the context menu option associated with decryption. 2. Enter the Pass Phrase associated with your Private/Public key set and allow the decrypted file to be saved where you can easily find it. Remember that encrypted file extensions may vary. The most common are.pgp,.gpg, and.asc. The extension may have to be configured in your encryption software or changed to suit your software s requirements. IEHP Provider EDI Manual 07/15 II-4

B. Encryption Questions and Answers Q: What is OpenPGP based encryption software? A: OpenPGP software allows data trading partners to securely exchange data, relying on Key or Certificate files to encrypt and decrypt the files only by those authorized to do so. Q: Who needs to have OpenPGP based encryption software? A: All data providers: IPAs, Hospitals, clearinghouses, which exchange data electronically with IEHP may at some point be required to decrypt files posted by IEHP. Q: Why do we need to have OpenPGP based encryption software? A: OpenPGP based software allows the users to scramble and encrypt a file. If anyone other than the intended recipient intercepts the encrypted file, it is not readable. PGP also complies with HIPAA and State requirements that a secure means of transmission be implemented. Q: How do we obtain a copy of an OpenPGP based encryption software? A: Both commercial and open source software packages based on the OpenPGP Standard can be found online. Examples include PGP at http://www.pgp.com/ or GPG at http://www.gnupg.org/. Q: Can I share my keys and if so, how? A: Yes. Encryption Software based on the OpenPGP standard use keyrings or certificate servers to share keys. See your software s guide to find out how. Q: If different people/entities process Eligibility, Encounter, Capitation, and Claims data for my organization, do I need separate keys/software/etc? A: While you will not need additional software, it would be best to have different keys for each of these functions to prevent accidental decryption of the various file types by unauthorized personnel. IEHP Provider EDI Manual 07/15 II-5