HIPPA compliance

Return to Introduction  Previous  Next

HIPAA electronic information protection requirements.

 

To the best of our knowledge there are no specific defined standards as part of the HIPPA electronic information protection requirements. Healthcare organizations are required to individually assess their PHI security and privacy requirements, based on which they must take suitable measures to implement electronic protection.

 

Nonetheless, it does appear that in practical terms, almost every Given the focus of safeguarding Protected Health Information, requiring the ability to control access and protect information from accidental or intentional disclosure to unauthorized persons and from alteration, destruction or loss. Defining boundaries to ascertain who /what will be covered - any individually identifiable health information maintained or transmitted electronically, including overall demographics and other second level information.

 

This is where our core competency gives us an edge - we are already in the business of providing easy to use, foolproof, desktop and network security products.

 

Bullet Our Solutions are scalable and can fit the needs of all healthcare organizations. Our products can even be tailored to meet a specific subset of the general HIPAA electronic security guidelines.

 

Cypherix SE is scalable and can fit the needs of all healthcare  organizations.

 

Bullet In particular, this  out of the box solution complies with Security standards as enumerated  in the Fed Reg 45 CFR, Part 142 - [43249]Backups - scalable [43252]  Contingency, data backup It also meets requirements under  Recommendation 1, Technical practices and procedures, in particular  necessary 43250; [43253] [b] [c] [d] [e]; [43255] Transmission of data  - secure email and Complies with section 142.105, 302, 306, 308.

 

Bullet Our products comply, inter alia, with the parameters set out in the Federal Register 45 CFR, Part 142. [43249] Backups

 

Bullet It also meets requirements under  Recommendation 1, Technical practices and procedures

[43253] [b] [c] [d] [e]; [43255]

Transmission of data secure email and Complies with section 142.105, 302, 306, 308

"HCFA Internet Security Policy" found at cms.hhs.gov/it/security/docs/internet_policy.pdf.

 

Bullet "As of November 1998, a level of encryption protection equivalent to that provided by an algorithm such as Triple56 bitDES (defined as 112 bit equivalent) for symmetric encryption, 1024 bit algorithms for asymmetric systems, and 160 bits for the emerging Elliptical Curve systems is recognized by HCFA as minimally acceptable. HCFA reserves the right to increase these minimum levels when deemed necessary by advances in techniques and capabilities associated with the processes used by attackers to break encryption (for example, a brute-force exhaustive search)."

 

Bullet Our flexible, end-user dependant electronic security and privacy solutions conform to the HIPAA guidelines and provide complete solutions to the healthcare institutions electronic security requirements.

 

Bullet Most end users of HIPAA compliant electronic security products may not be conversant with electronic security requirements and concepts.