Tuesday, February 25, 2014

Data In Motion: Secure Your Organization ' s Information

Data In Motion: Secure Your Organization ' s Information




As the United States healthcare system continues to proceeding toward Electronic Health Records ( EHR ) in compliance with the Health Information Technology for Economic and Clinical Health ( HITECH ) Act of 2009, questions about security of information project to be addressed. The US Health Insurance Portability and Load Act ( HIPAA ) depend upon rigorous care in the service of sheltered health information ( PHI ).

One of the benefits of electronic records is the ability to quickly transmit data across the country or around the world. Whenever safe health information ( PHI ) is being transmitted electronically to a third party via email, FTP or other anatomy of communication, it is considered " data in motion. " The National Institute of Standards and Technology ( NIST ) and HIPAA order that the movement of PHI via electronic means must give blessing with their standards for security. Unfortunately, it is far too easy for unsecure commodities to be breached and identifying information used in malicious ways. HIPAA and NIST are concerned that good practices are practical and that important patient information is defended.

Further, the HITECH Act ( ARRA ) of 2009 below the guidance of the Department of Health and Human Services ( HHS ) has outlined a " safe harbor " in which breached information does not need to be reported. Essentially, if PHI is nonfunctional, hieroglyphic or unreadable to unauthorized individuals, covered physicians and hospitals will not be matter to HITECH ' s schism instruction requirements. Encryption and tomb are two options for enumeration PHI weak, scrawled or illegible to unauthorized individuals.

PHI is singular encrypted if an algorithmic process has been used to account for the freight essentially dopy without the use of a recognized process or key. For " data at hang in " ( stored on databases and queue systems ), the NIST has different requirements and guidelines than for " data in motion. "

Some companies offer a customizable production for hospitals and regular practices that meets and exceeds the NIST standards for protecting " data in motion. " They also offer encryption that allows your metropolitan hospital or rural community clinic to take advantage of the Safe Harbor Rule and exempts your organization from having to report a breach to HHS.

Currently, the biggest threat to HITECH compliance is protection of PHI en outing across the country or around the world via email, FTP or other electronic outline of communication. A mammoth ratio of breaches that have in duration occurred involve some type of information moving from one entity to extra. Protect your healthcare organization with software equal as Encrypt - A - Note and safeguard your " data in motion " needs are met.

No comments:

Post a Comment