SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
www.bigid.com • info@bigid.com • @bigidsecure
A Data Driven Approach for ePHI Protection
HIPAA Data
Security &
Privacy
Under the HIPAA mandate, covered entities and business associates
are subject to the Security Rule that covers confidentiality, integrity,
and availability of electronic Protected Health Information (ePHI) and
the Privacy Rule that limits the uses and disclosures of PHI. These rules
have long been in place, but how ePHI moves through and across
IT infrastructure and is tied to Personal Information within IT systems
and applications has shifted since the rules were first written.
Also, the penalties levied by regulators for breach, unauthorized
disclosure and privacy violations have escalated. BigID automatically
discovers, maps and labels all instances of PHI identifiers and across
data sources through novel correlation and machine learning
technologies to drive both security and privacy compliance initiatives.
Assess ePHI Risk
HIPAA risk analysis and assessment has many components, but integral to
making a informed risk analysis is a current and comprehensive understanding
where ePHI is stored. Many healthcare organizations have clearly delineated and
segmented operations, payments and transactions systems. However, once data
moves out of these systems into unstructured data repositories through
undocumented processes, such as patient identity saved to case management
notes for example, organizations lose visibility and can no longer adequately
assess risk. BigID's unique discovery and correlation capabilities automatically
find all PHI in unstructured data stores - providing context that traditional pattern-
matching approaches cannot. The technology utilizes enrichment techniques to
associate data values with patient identities in structured datastores even if
column, table and field names are inconsistent and cannot be captured through
manual processes. Moreover, organizations can calibrate risk for individual data
values by attribute, data source and application to inform how security measures
are configured and to align with threat occurrence analysis.
Mapping ePHI involves determining where that data is stored, what processing steps are
involved and how the data flows internally and externally so as understand risks and the
state of compliance. Building data maps based on stakeholder surveys can be laborious
and manually intensive process with impressionistic, rather than accurate outcomes.
Likewise, using tools that rely on Regular Expression pattern matching are prone to false
positives, and cannot determine whether demographic identifiers should be classified as
ePHI based on context, such as proximity to patient identifier. BigID automates the
building and maintenance of data flow maps from actual system scan output across data
sources with integrated ePHI classification. It also automates the ability to add context
augmentation such as why ePHI is being collected or transferred for a specific processing
step. As scans uncover new ePHI, or additional identifiers are classified as ePHI based on
automated discovery, organizations can proactively identify compliance and initiate
remediation steps like minimizing data.
ePHI Data Mapping
www.bigid.com • info@bigid.com • @bigidsecure
Your Customers' Privacy, Protected!
Breach Response
The HIPAA Breach Notification Rule requires covered entities and business associates
to notify affected individuals, HHS and sometimes the media “without unreasonable
delay” and no more than 60 days after a security breach is discovered if 500 or more
individuals are affected. Many state laws require an even shorter notification timeline.
Timely, effective and comprehensive breach response is contingent on whether
organizations can expeditiously determine which identifiers, and whose data, were
impacted. Based on BigIDʼs mapping and indexing of ePHI by data source, security
teams can better understand their data breach risk and security measures applied. In
the event of an incident or data breach, Security and IT teams can quickly scope the
impact and understand which identifiers and attributes have been impacted by a
breach based on BigIDʼs inventory of ePHI and identities by data source.
BigID is redefining personal data protection and privacy in the enterprise.
Organizations are facing record breaches of personal information and more onerous
regulator enforcement and penalties - even as privacy expectations grow.
BigID gives organizations software to automate the security and management of structured
and unstructured PHI data across datacenters and cloud. Using BigID, enterprises can
better steward their most vital assets: their customer, employee and PHI data.
For more information, email info@bigid.com or schedule a demo at bigid.com/demo
How BigID Can Help
While the HIPAA Security and Privacy rules define a specific set of identifiers
under the PHI category, the rules apply to "individually identifiable information
relating to the health status of an individual, the provision of healthcare, or
individually identifiable information that is created, collected, or transmitted by a
HIPAA- covered entity in relation to payment for healthcare services."
To comprehensively discover and classify ePHI across all data sources and determine
whether an identifier relates to a specific individual in order to apply the appropriate
security measures requires identity context. BigID utilizes correlation and machine
learning to connect data elements back to the identity of the individual, improving
the accuracy of determining what should be classified as ePHI. To simplify
enforcement on classified data, BigID enables customers to automatically assign
ePHI classification labels for files and tag data elements. These tags can be
consumed by enforcement technologies such as Microsoft's Azure Information
Protection or serve as input for de-identification processes.
ePHI Classification and Labeling
A Data Driven Approach for ePHI Protection

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (17)

BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data  Discovery to...BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data  Discovery to...
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
 
BigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetBigID Virtual MDM Data Sheet
BigID Virtual MDM Data Sheet
 
BigID's Smart Data Labeling and Tagging
BigID's Smart Data Labeling and TaggingBigID's Smart Data Labeling and Tagging
BigID's Smart Data Labeling and Tagging
 
BigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data SheetBigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data Sheet
 
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetBigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
 
BigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data SheetBigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data Sheet
 
BigID PII & PI Discovery for GDPR Data Sheet
BigID PII & PI Discovery for GDPR Data SheetBigID PII & PI Discovery for GDPR Data Sheet
BigID PII & PI Discovery for GDPR Data Sheet
 
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law
 
(SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data Privacy
(SACON) Shivangi Nadkarni & Sandeep Rao -  An introduction to Data Privacy(SACON) Shivangi Nadkarni & Sandeep Rao -  An introduction to Data Privacy
(SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data Privacy
 
Beyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal AuditBeyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal Audit
 
GDPR Seminar Slides
GDPR Seminar SlidesGDPR Seminar Slides
GDPR Seminar Slides
 
Real world data engineering practices for GDPR
Real world data engineering practices for GDPRReal world data engineering practices for GDPR
Real world data engineering practices for GDPR
 
Checklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR complianceChecklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR compliance
 
Finding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA ComplianceFinding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA Compliance
 
Gigya's China Data Center - Data Sheet
Gigya's China Data Center - Data SheetGigya's China Data Center - Data Sheet
Gigya's China Data Center - Data Sheet
 

Ähnlich wie BigID Data Sheet HIPAA Data Security & Privacy

Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Cheryl Goldberg
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Cheryl Goldberg
 
eBusinessinHealthcare_Final
eBusinessinHealthcare_FinaleBusinessinHealthcare_Final
eBusinessinHealthcare_Final
Heather Tomlin
 
Healthcare preparedness 2010
Healthcare preparedness 2010Healthcare preparedness 2010
Healthcare preparedness 2010
DataMotion
 
Healthcare preparedness 2010
Healthcare preparedness 2010Healthcare preparedness 2010
Healthcare preparedness 2010
DataMotion
 

Ähnlich wie BigID Data Sheet HIPAA Data Security & Privacy (20)

4. data security eb__1_
4. data security eb__1_4. data security eb__1_
4. data security eb__1_
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
BigID Data Sheet: Enterprise Privacy Management
BigID Data Sheet: Enterprise Privacy ManagementBigID Data Sheet: Enterprise Privacy Management
BigID Data Sheet: Enterprise Privacy Management
 
Guide to hipaa compliance for containers
Guide to hipaa compliance for containersGuide to hipaa compliance for containers
Guide to hipaa compliance for containers
 
The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!
The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!
The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!
 
eBusinessinHealthcare_Final
eBusinessinHealthcare_FinaleBusinessinHealthcare_Final
eBusinessinHealthcare_Final
 
Healthcare preparedness 2010
Healthcare preparedness 2010Healthcare preparedness 2010
Healthcare preparedness 2010
 
Healthcare preparedness 2010
Healthcare preparedness 2010Healthcare preparedness 2010
Healthcare preparedness 2010
 
BRG_TAP_IG_20150826_WEB
BRG_TAP_IG_20150826_WEBBRG_TAP_IG_20150826_WEB
BRG_TAP_IG_20150826_WEB
 
HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007HIMSS GSA e-Authentication whitepaper June 2007
HIMSS GSA e-Authentication whitepaper June 2007
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
 
Medical Data Encryption 101
Medical Data Encryption 101Medical Data Encryption 101
Medical Data Encryption 101
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva inc
 
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdfUnderstanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
Understanding the Importance of HIPAA Compliance in Medical Billing Software.pdf
 
An Overview of HIPAA Laws and Regulations.pdf
An Overview of HIPAA Laws and Regulations.pdfAn Overview of HIPAA Laws and Regulations.pdf
An Overview of HIPAA Laws and Regulations.pdf
 
HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
How to Ensure HIPPA Compliance
How to Ensure HIPPA ComplianceHow to Ensure HIPPA Compliance
How to Ensure HIPPA Compliance
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 

Kürzlich hochgeladen

%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 

Kürzlich hochgeladen (20)

%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT  - Elevating Productivity in Today's Agile EnvironmentHarnessing ChatGPT  - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 

BigID Data Sheet HIPAA Data Security & Privacy

  • 1. www.bigid.com • info@bigid.com • @bigidsecure A Data Driven Approach for ePHI Protection HIPAA Data Security & Privacy Under the HIPAA mandate, covered entities and business associates are subject to the Security Rule that covers confidentiality, integrity, and availability of electronic Protected Health Information (ePHI) and the Privacy Rule that limits the uses and disclosures of PHI. These rules have long been in place, but how ePHI moves through and across IT infrastructure and is tied to Personal Information within IT systems and applications has shifted since the rules were first written. Also, the penalties levied by regulators for breach, unauthorized disclosure and privacy violations have escalated. BigID automatically discovers, maps and labels all instances of PHI identifiers and across data sources through novel correlation and machine learning technologies to drive both security and privacy compliance initiatives. Assess ePHI Risk HIPAA risk analysis and assessment has many components, but integral to making a informed risk analysis is a current and comprehensive understanding where ePHI is stored. Many healthcare organizations have clearly delineated and segmented operations, payments and transactions systems. However, once data moves out of these systems into unstructured data repositories through undocumented processes, such as patient identity saved to case management notes for example, organizations lose visibility and can no longer adequately assess risk. BigID's unique discovery and correlation capabilities automatically find all PHI in unstructured data stores - providing context that traditional pattern- matching approaches cannot. The technology utilizes enrichment techniques to associate data values with patient identities in structured datastores even if column, table and field names are inconsistent and cannot be captured through manual processes. Moreover, organizations can calibrate risk for individual data values by attribute, data source and application to inform how security measures are configured and to align with threat occurrence analysis. Mapping ePHI involves determining where that data is stored, what processing steps are involved and how the data flows internally and externally so as understand risks and the state of compliance. Building data maps based on stakeholder surveys can be laborious and manually intensive process with impressionistic, rather than accurate outcomes. Likewise, using tools that rely on Regular Expression pattern matching are prone to false positives, and cannot determine whether demographic identifiers should be classified as ePHI based on context, such as proximity to patient identifier. BigID automates the building and maintenance of data flow maps from actual system scan output across data sources with integrated ePHI classification. It also automates the ability to add context augmentation such as why ePHI is being collected or transferred for a specific processing step. As scans uncover new ePHI, or additional identifiers are classified as ePHI based on automated discovery, organizations can proactively identify compliance and initiate remediation steps like minimizing data. ePHI Data Mapping
  • 2. www.bigid.com • info@bigid.com • @bigidsecure Your Customers' Privacy, Protected! Breach Response The HIPAA Breach Notification Rule requires covered entities and business associates to notify affected individuals, HHS and sometimes the media “without unreasonable delay” and no more than 60 days after a security breach is discovered if 500 or more individuals are affected. Many state laws require an even shorter notification timeline. Timely, effective and comprehensive breach response is contingent on whether organizations can expeditiously determine which identifiers, and whose data, were impacted. Based on BigIDʼs mapping and indexing of ePHI by data source, security teams can better understand their data breach risk and security measures applied. In the event of an incident or data breach, Security and IT teams can quickly scope the impact and understand which identifiers and attributes have been impacted by a breach based on BigIDʼs inventory of ePHI and identities by data source. BigID is redefining personal data protection and privacy in the enterprise. Organizations are facing record breaches of personal information and more onerous regulator enforcement and penalties - even as privacy expectations grow. BigID gives organizations software to automate the security and management of structured and unstructured PHI data across datacenters and cloud. Using BigID, enterprises can better steward their most vital assets: their customer, employee and PHI data. For more information, email info@bigid.com or schedule a demo at bigid.com/demo How BigID Can Help While the HIPAA Security and Privacy rules define a specific set of identifiers under the PHI category, the rules apply to "individually identifiable information relating to the health status of an individual, the provision of healthcare, or individually identifiable information that is created, collected, or transmitted by a HIPAA- covered entity in relation to payment for healthcare services." To comprehensively discover and classify ePHI across all data sources and determine whether an identifier relates to a specific individual in order to apply the appropriate security measures requires identity context. BigID utilizes correlation and machine learning to connect data elements back to the identity of the individual, improving the accuracy of determining what should be classified as ePHI. To simplify enforcement on classified data, BigID enables customers to automatically assign ePHI classification labels for files and tag data elements. These tags can be consumed by enforcement technologies such as Microsoft's Azure Information Protection or serve as input for de-identification processes. ePHI Classification and Labeling A Data Driven Approach for ePHI Protection