SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Downloaden Sie, um offline zu lesen
HIPAA Compliance
for Developers
Breaking down the regulatory issues around building
digital health apps for fun and proļ¬t.
HIPAA compliant database-as-a-service
HIPAA Compliance is a ā€Ø
Brutal Time Suck!
!
ā€œ[Building our own HIPAA compliant infrastructure] took upwards of
1,000 person-hours to ļ¬gure out HIPAA-compliance issues. This will
continue to be an ongoing cost for us, because HIPAA is an ongoing law
and it changes sometimes. It takes substantial auditing time and money.
TrueVault would save us all that.ā€
ā€Ø
Posted on Hacker News by jphā€Ø
(Unsolicited comment. Not a customer.)
HIPAA compliant database-as-a-service
First oļ¬€, What is HIPAA?
Health Insurance Portability and Accountability Act
ā€¢ HIPAA sets the standard for protecting sensitive patient data.
ā€¢ Covered Entities and their Business Associates need to protect
the privacy and security of protected health information (PHI).
ā€¢ Developed in 1996. HIPAA was initially created to help the public
with insurance portability. In addition, they built a series of privacy
tools to protect healthcare data.
HIPAA compliant database-as-a-service
What Does HIPAA Require?
1.Put safeguards in place to protect patient health information.
2.Reasonably limit use and sharing to the minimum necessary to
accomplish your intended purpose.
3.Have agreements in place with service providers that perform covered
functions. These agreements (BAAs) ensure that service providers
(Business Associates) use, safeguard and disclose patient information
properly.
4.Procedures to limit who can access patient health information, and
training programs about how to protect patient health information.
HIPAA compliant database-as-a-service
The Four Rules of HIPAA
Like the four horsemen, these are the major pieces that govern what you do
and how you do it.
1.HIPAA Privacy Rule
2.HIPAA Security Rule
3.HIPAA Enforcement Rule
4.HIPAA Breach Notiļ¬cation Ruleā€Ø
HIPAA compliant database-as-a-service
Developers need to focus on the Technical and Physical
safeguards outlined in the Security Rule.
The Privacy Rule
HIPAA compliant database-as-a-service
Addresses the saving, accessing and sharing of
medical and personal information of an individual,
including a patientā€™s own right to access.
The Security Rule
HIPAA compliant database-as-a-service
Outlines national security standards intended to
protect health data created, received, maintained,
or transmitted electronically.
The Security Rule
HIPAA compliant database-as-a-service
September 23, 2013
Before Sept 23. Rules applied to hospitals, doctors, clinics, etc. After Sept 23. The rules now apply to anyone
that touches PHI.ā€Ø
ā€Ø
(e.g. an IT company or a mHealth
application that provides secure photo-
sharing for physicians).
Any company that deals with protected health information (PHI) must
ensure that all the required physical, network, and process security
measures are in place and followed.
HIPAA compliant database-as-a-service
ā€œDo I need to be
HIPAA compliant?ā€
HIPAA compliant database-as-a-service
ā€œDo I need to be
HIPAA compliant?ā€
If you handle PHI then you need to be HIPAA compliant.
The HIPAA rules apply to both Covered Entities
and their Business Associates
What is Protected Health
Information (PHI)?
ā€¢ PHI is any information in a medical record that can be used to
identify an individual, and that was created, used, or disclosed in
the course of providing a healthcare service.
ā€¢ Includes:
ā€¢ Medical records
ā€¢ Billing information
ā€¢ Health insurance information
ā€¢ Any individually identiļ¬able health information
HIPAA compliant database-as-a-service
Electronic Protected Health
Information (EPHI)
HIPAA compliant database-as-a-service
All individually identiļ¬able health information that
is created, maintained, or transmitted
electronically.
Covered Entity (CE)
HIPAA compliant database-as-a-service
ā€¢ Anyone who provides treatment, payment and operations in
healthcare.
ā€¢ Includes:
ā€¢ Doctorā€™s oļ¬ƒce, dental oļ¬ƒces, clinics, psychologists,
ā€¢ Nursing home, pharmacy, hospital or home healthcare agency
ā€¢ Health plans, insurance companies, HMOs
ā€¢ Government programs that pay for healthcare
ā€¢ Health clearing houses
Business Associate (BA)
HIPAA compliant database-as-a-service
ā€¢ Anyone who has access to patient information, whether directly, indirectly,
physically or virtually.
ā€¢ Any organization that provides support in the treatment, payment or operations
ā€¢ Includes:
ā€¢ IT providers, health applications
ā€¢ Telephone service provider, document management and destruction
ā€¢ Accountant, lawyer or other service provider
Business associates have the responsibility to achieve and maintain HIPAA
compliance in terms of all of the internal, administrative, and technical safeguards.
Exceptions
HIPAA compliant database-as-a-service
ā€¢ Entities providing data transmission services, including services that
involve temporary storage of PHI that is incident to the
transmission (e.g. courier services and their electronic equivalents,
such as ISPs or telecoms).
While entities that are ā€œmere conduitsā€ for PHI are not Business Associates, the
rules emphasize that this exception is narrow.
HIPAA compliant database-as-a-service
ā€œWho certiļ¬es HIPAA
compliance?ā€
HIPAA compliant database-as-a-service
ā€œWho certiļ¬es HIPAA
compliance?ā€
The short answer is no one.
Who certiļ¬es HIPAA
compliance?
ā€¢ Unlike PCI, there is no one that can ā€œcertifyā€ that an organization is HIPAA
compliant.
ā€¢ The Oļ¬ƒce for Civil Rights (OCR) from the Department of Health and Human
Services (HHS) is the federal governing body. HHS does not endorse or
recognize the ā€œcertiļ¬cationsā€ made by private organizations.
ā€¢ The evaluation standard in the Security Rule Ā§ 164.308(a)(8) requires you to
perform a periodic technical and non-technical evaluation to make sure your
security policies and procedures meet security requirements.
ā€¢ But, HHS doesnā€™t care if the evaluation is performed internally or by an external
organization.
HIPAA compliant database-as-a-service
Penalties & Fines
ā€¢ Violations are expensive, to put it mildly.
HIPAA compliant database-as-a-service
HIPAA compliant database-as-a-service
ā€œHow do I become
HIPAA compliant?ā€
HIPAA compliant database-as-a-service
ā€œHow do I become
HIPAA compliant?ā€
The HIPAA Security Rule requires appropriate Administrative,
Physical, and Technical Safeguards to ensure the conļ¬dentiality,
integrity, and security of protected health information (PHI).
3 Parts to the Security Rule
1.Administrative Safeguards
2.Technical Safeguards
3.Physical Safeguards
HIPAA compliant database-as-a-service
ā€œrequiredā€ vs. ā€œaddressableā€
ā€¢ Some implementation speciļ¬cations are ā€œrequiredā€ and others are
ā€œaddressable.ā€ Required implementation speciļ¬cations must be
implemented.
ā€¢ Addressable implementation speciļ¬cations must be implemented if it is
reasonable and appropriate to do so; your choice must be documented.
ā€¢ It is important to remember that an addressable implementation
speciļ¬cation is not optional.
HIPAA compliant database-as-a-service
When in doubt, you should just implement the addressable implementation
speciļ¬cations. Most of them are best practices anyway.
Administrative Safeguards
The administrative components are really important when
implementing a HIPAA compliance program; you are required to:
1.Assign a privacy oļ¬ƒcer
2.Complete a risk assessment annually
3.Implement employee training
4.Review policies and procedures
5.Execute Business Associate Agreements (BAAs) with all partners
who handle protected health information (PHI)
HIPAA compliant database-as-a-service
Administrative Safeguards
Companies who can help with the administrative components of a
compliance program:
ā€¢ Accountable -- http://accountablehq.com
ā€¢ Compliance Helper -- http://www.compliancehelper.com
ā€¢ Compliancy Group -- http://compliancy-group.com
HIPAA compliant database-as-a-service
Technical Safeguards
1.Access Control - Unique User Identiļ¬cation (required): Assign a unique
name and/or number for identifying and tracking user identity.
2.Access Control - Emergency Access Procedure (required): Establish (and
implement as needed) procedures for obtaining necessary ePHI during an
emergency.
3.Access Control - Automatic Logoļ¬€ (addressable): Implement electronic
procedures that terminate an electronic session after a predetermined time of
inactivity.
4.Access Control - Encryption and Decryption (addressable): Implement a
mechanism to encrypt and decrypt ePHI.
HIPAA compliant database-as-a-service
Technical Safeguards
5.Audit Controls (required): Implement hardware, software, and/or procedural mechanisms that
record and examine activity in information systems that contain or use ePHI.
6.Integrity - Mechanism to Authenticate ePHI (addressable): Implement electronic mechanisms
to corroborate that ePHI has not been altered or destroyed in an unauthorized manner.
7.Authentication (required): Implement procedures to verify that a person or entity seeking
access to ePHI is the one claimed.
8.Transmission Security - Integrity Controls (addressable): Implement security measures to
ensure that electronically transmitted ePHI is not improperly modiļ¬ed without detection until
disposed of.
9.Transmission Security - Encryption (addressable): Implement a mechanism to encrypt ePHI
whenever deemed appropriate.
HIPAA compliant database-as-a-service
Physical Safeguards
1.Facility Access Controls - Contingency Operations (addressable): Establish (and implement as needed) procedures that allow facility
access in support of restoration of lost data under the disaster recovery plan and emergency mode operations plan in the event of an
emergency.
2.Facility Access Controls - Facility Security Plan (addressable): Implement policies and procedures to safeguard the facility and the
equipment therein from unauthorized physical access, tampering, and theft.
3.Facility Access Controls - Access Control and Validation Procedures (addressable): Implement procedures to control and validate
a personā€™s access to facilities based on their role or function, including visitor control, and control of access to software programs for
testing and revision.
4.Facility Access Controls - Maintenance Records (addressable): Implement policies and procedures to document repairs and
modiļ¬cations to the physical components of a facility which are related to security (e.g. hardware, walls, doors, and locks).
5.Workstation Use (required): Implement policies and procedures that specify the proper functions to be performed, the manner in
which those functions are to be performed, and the physical attributes of the surroundings of a speciļ¬c workstation or class of
workstation that can access ePHI.
HIPAA compliant database-as-a-service
HIPAA Compliant Hosting Providers can take care of some of the Physical
Safeguards for you.
Physical Safeguards
6.Workstation Security (required): Implement physical safeguards for all workstations that
access ePHI, to restrict access to authorized users.
7.Device and Media Controls - Disposal (required): Implement policies and procedures to
address the ļ¬nal disposition of ePHI, and/or the hardware or electronic media on which it is
stored.
8.Device and Media Controls - Media Re-Use (required): Implement procedures for removal of
ePHI from electronic media before the media are made available for re-use.
9.Device and Media Controls - Accountability (addressable): Maintain a record of the
movements of hardware and electronic media and any person responsible therefore.
10.Device and Media Controls - Data Backup and Storage (addressable): Create a
retrievable, exact copy of ePHI, when needed, before movement of equipment.
HIPAA compliant database-as-a-service
TrueVault Handles All
Technical Requirements
HIPAA compliant database-as-a-service
Administrative Safeguards
Technical Safeguards
Encryption and Decryption, Key Management,
Key Rotation, Access Control, Unique User
Identiļ¬cation, Emergency Access, Automatic
Logoļ¬€, Audit Controls, Mechanism to
Authenticate Electronic PHI, Person or Entity
Authentication, Transmission Security, Integrity
Controls
Physical Safeguards
Facility Access Ctrl, Workstation Use and
Security, Devices and Media Controls
HIPAA Compliant
Hosting
TrueVault
ā€¢ TrueVault handles both
Technical and Physical
Safeguards.
!
ā€¢ Develop a healthcare
application without building a
HIPAA compliant infrastructure.
!
ā€¢ FireHost and AWS have high
minimum charges ($1,115 and
$1,500) and oļ¬€er no help with
the Technical Safeguards.
How Does TrueVault Fit In?
HIPAA compliant database-as-a-service
!
ā€¢ Developers access TrueVault
via a RESTful API and native
clients.
!
ā€¢ Typical integration takes days.
TrueVault works just like any
other API services.
!
ā€¢ TrueVault provides all client-
side and server-side
functionalities required by
HIPAA.
Customer)Backend)Web)
Services))
Standard)Database)
TrueVault)
(HIPAA)Compliant))
non@PHI)Data)
PHI)Data)
(REST)API))
TrueVault Features
HIPAA compliant database-as-a-service
JSON Store
The TrueVault JSON Store is a lightweight, document-oriented
storage system, and enables persistent HIPAA compliant storage of
JSON documents.
BLOB Store
The TrueVault BLOB (binary large object) Store oļ¬€ers HIPAA compliant
binary storage for any ļ¬le format. This includes DICOM ļ¬les (e.g. X-Rays,
CT Scans, MRIs), PDFs, scanned medical records, images, and videos.
Encrypted Search
Search encrypted data stored in TrueVault. Query (GET) documents
by any ļ¬eld, not just the documentId.
TrueVault Features
HIPAA compliant database-as-a-service
Browser-to-TrueVault Upload
Browser-to-TrueVault direct ļ¬le upload and download web form. You
can upload binary ļ¬les directly to TrueVaultā€™s BLOB Store using
HTML forms.
User Management and Authentication
User Management console. You can create and manage users, groups,
and permissions via TrueVault so that PHI never touches your stack.
TrueVault provides identity and access management, plus 2-factor
authentication out of the box. Use our identity API for custom access
ļ¬‚ows or add Sign-In, Sign-Up, and My Account pages in seconds with
our JavaScript user controls.
Encryption and Decryption
TrueVault encrypts all at-rest data with AES-256 and stores keys
securely. Our infrastructure for healthcare data storage and
transmission runs in a separate hosting environment inaccessible by
our primary services.
TrueVault Features
HIPAA compliant database-as-a-service
Audit Control
Every user action and API call is automatically recorded for
compliance. An audit log can be searched and retrieved via our API.
Automatic Logoļ¬€
Conļ¬gure the automatic user session timeout window via our API or the
Management Console.
Emergency Access
Easily add an Emergency Access Request page to your app with a
CNAME record. Weā€™ll handle the authentication ļ¬‚ow for you, and
track activities for compliance. Single-user credentials can also be
created via the API for custom emergency workļ¬‚ows.
TrueVault Features
HIPAA compliant database-as-a-service
Proactive Monitoring
TrueVaultā€™s proprietary anomaly-based detection algorithm will alert
you, or your customer, when abnormal user activity is detected.
At-Rest Data Integrity
A checksum is computed for every at-rest record, and the integrity of
the data is continuously checked.
Integrity Control and Encryption
TrueVault regularly audits the details of our implementation: the
certiļ¬cates we serve, our certiļ¬cate authorities, and our ciphers. We
ensure that browsers and API clients interact with TrueVault over
HTTPS only.
HIPAA compliant database-as-a-service
"Becoming HIPAA compliant as an early stage organization was a
daunting task, until we found TrueVault! Their turn-key API has
allowed us to check this box and get back to focusing on our core
product and oļ¬€ering."
Edith Elliottā€Ø
CEO Noora Health
Try TrueVault for Free
HIPAA compliant database-as-a-service
$0.001 / API call / monthFree for Development
ā€¢ No credit card required.
ā€¢ No time limit on the free trial period.
ā€¢ Unlimited API calls and storage.
ā€¢ But, no BAA and no insurance.
API Calls Monthly Cost
ā€Ø0 -100,000 $100
101,000 $101
250,000 $250
1,000,000 $1,000
ā€¢ Unlimited JSON documents
ā€¢ Unlimited BLOB objects
ā€¢ Business Associated Agreement
ā€¢ Privacy/Data Breach Insurance
ā€¢ Service Level Agreement
Get Started

Weitere Ƥhnliche Inhalte

Was ist angesagt?

Introduction to HIPAA for Healthcare Professionals by OUP
Introduction to HIPAA for Healthcare Professionals by OUPIntroduction to HIPAA for Healthcare Professionals by OUP
Introduction to HIPAA for Healthcare Professionals by OUPAtlantic Training, LLC.
Ā 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
Ā 
hitech act
hitech acthitech act
hitech actpadler01
Ā 
Welcome to HIPAA Training
Welcome to HIPAA TrainingWelcome to HIPAA Training
Welcome to HIPAA TrainingJonathan Montes
Ā 
A brief introduction to hipaa compliance
A brief introduction to hipaa complianceA brief introduction to hipaa compliance
A brief introduction to hipaa compliancePrince George
Ā 
Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118robint2125
Ā 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowCompliancy Group
Ā 
Electronic Health Record (EHR)
Electronic Health Record (EHR)Electronic Health Record (EHR)
Electronic Health Record (EHR)sourav goswami
Ā 
HIPAA AND INFORMATION TECHNOLOGY
HIPAA AND INFORMATION TECHNOLOGYHIPAA AND INFORMATION TECHNOLOGY
HIPAA AND INFORMATION TECHNOLOGYmariaradziminski
Ā 
HIPAA and How it Applies to You
HIPAA and How it Applies to YouHIPAA and How it Applies to You
HIPAA and How it Applies to YouWinston & Strawn LLP
Ā 
Providers in U.S Healthcare
Providers in U.S HealthcareProviders in U.S Healthcare
Providers in U.S HealthcareSugandha Dogra
Ā 
HIPAA
HIPAAHIPAA
HIPAAKarna *
Ā 
Lifecycle Of A Claim
Lifecycle Of A ClaimLifecycle Of A Claim
Lifecycle Of A Claimnitinsaini12
Ā 

Was ist angesagt? (20)

Introduction to HIPAA for Healthcare Professionals by OUP
Introduction to HIPAA for Healthcare Professionals by OUPIntroduction to HIPAA for Healthcare Professionals by OUP
Introduction to HIPAA for Healthcare Professionals by OUP
Ā 
HIPAA Basics by Brian Fleetham
HIPAA Basics by Brian FleethamHIPAA Basics by Brian Fleetham
HIPAA Basics by Brian Fleetham
Ā 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
Ā 
Hitech Act
Hitech ActHitech Act
Hitech Act
Ā 
HIPAA Privacy & Security
HIPAA Privacy & SecurityHIPAA Privacy & Security
HIPAA Privacy & Security
Ā 
hitech act
hitech acthitech act
hitech act
Ā 
Welcome to HIPAA Training
Welcome to HIPAA TrainingWelcome to HIPAA Training
Welcome to HIPAA Training
Ā 
A brief introduction to hipaa compliance
A brief introduction to hipaa complianceA brief introduction to hipaa compliance
A brief introduction to hipaa compliance
Ā 
Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118
Ā 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to know
Ā 
HIPAA
HIPAAHIPAA
HIPAA
Ā 
HIPAA & PHI Training
HIPAA & PHI TrainingHIPAA & PHI Training
HIPAA & PHI Training
Ā 
Electronic Health Record (EHR)
Electronic Health Record (EHR)Electronic Health Record (EHR)
Electronic Health Record (EHR)
Ā 
HIPAA AND INFORMATION TECHNOLOGY
HIPAA AND INFORMATION TECHNOLOGYHIPAA AND INFORMATION TECHNOLOGY
HIPAA AND INFORMATION TECHNOLOGY
Ā 
HIPAA and How it Applies to You
HIPAA and How it Applies to YouHIPAA and How it Applies to You
HIPAA and How it Applies to You
Ā 
Powerpoint presentation on EHR
Powerpoint presentation on EHRPowerpoint presentation on EHR
Powerpoint presentation on EHR
Ā 
Providers in U.S Healthcare
Providers in U.S HealthcareProviders in U.S Healthcare
Providers in U.S Healthcare
Ā 
HIPAA
HIPAAHIPAA
HIPAA
Ā 
Hitech Act
Hitech ActHitech Act
Hitech Act
Ā 
Lifecycle Of A Claim
Lifecycle Of A ClaimLifecycle Of A Claim
Lifecycle Of A Claim
Ā 

Ƅhnlich wie HIPAA Compliance for Developers

Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMBMeHealthCareSolutions
Ā 
HxRefactored - TrueVault - Jason Wang
HxRefactored - TrueVault - Jason WangHxRefactored - TrueVault - Jason Wang
HxRefactored - TrueVault - Jason WangHxRefactored
Ā 
An Overview of HIPAA Laws and Regulations.pdf
An Overview of HIPAA Laws and Regulations.pdfAn Overview of HIPAA Laws and Regulations.pdf
An Overview of HIPAA Laws and Regulations.pdfSeasiaInfotech2
Ā 
The importance of hipaa compliance and training
The importance of hipaa compliance and trainingThe importance of hipaa compliance and training
The importance of hipaa compliance and trainingLaDavia Day, MHA, BS
Ā 
Complying with HIPAA Security Rule
Complying with HIPAA Security RuleComplying with HIPAA Security Rule
Complying with HIPAA Security Rulecomplianceonline123
Ā 
Healthcare Compliance: HIPAA and HITRUST
Healthcare Compliance: HIPAA and HITRUSTHealthcare Compliance: HIPAA and HITRUST
Healthcare Compliance: HIPAA and HITRUSTControlCase
Ā 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesNisos Health
Ā 
Comp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesComp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesCMDLMS
Ā 
Explaining the HIPAA Privacy[.docx
Explaining the HIPAA Privacy[.docxExplaining the HIPAA Privacy[.docx
Explaining the HIPAA Privacy[.docxVistaInfosec
Ā 
Hipaa for business associates simple
Hipaa for business associates   simpleHipaa for business associates   simple
Hipaa for business associates simpleJose Ivan Delgado, Ph.D.
Ā 
Explain the security implications of HIPPA requirements for hospital.pdf
Explain the security implications of HIPPA requirements for hospital.pdfExplain the security implications of HIPPA requirements for hospital.pdf
Explain the security implications of HIPPA requirements for hospital.pdfarjunenterprises1978
Ā 
Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Kimberly Simon MBA
Ā 
HIPAA Compliance Testing In Software Applications.pdf
HIPAA Compliance Testing In Software Applications.pdfHIPAA Compliance Testing In Software Applications.pdf
HIPAA Compliance Testing In Software Applications.pdfZoe Gilbert
Ā 
HealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTHealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTKimberly Simon MBA
Ā 
HIPAA Compliant Salesforce Health Cloud ā€“ Why Healthcare Organizations Must C...
HIPAA Compliant Salesforce Health Cloud ā€“ Why Healthcare Organizations Must C...HIPAA Compliant Salesforce Health Cloud ā€“ Why Healthcare Organizations Must C...
HIPAA Compliant Salesforce Health Cloud ā€“ Why Healthcare Organizations Must C...Ajeet Singh
Ā 
Hi paa and eh rs
Hi paa and eh rsHi paa and eh rs
Hi paa and eh rssupportc2go
Ā 
Dental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business AssociatesDental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business Associatesgppcpa
Ā 
Importance of HIPAA Compliance for Small Healthcare Clinics.pptx
Importance of HIPAA Compliance for Small Healthcare Clinics.pptxImportance of HIPAA Compliance for Small Healthcare Clinics.pptx
Importance of HIPAA Compliance for Small Healthcare Clinics.pptxIT in DFW
Ā 
HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations OnRamp
Ā 
What Covered Entities Need to Know about OCR HIPAA Auditā€‹s
What Covered Entities Need to Know about OCR HIPAA Auditā€‹sWhat Covered Entities Need to Know about OCR HIPAA Auditā€‹s
What Covered Entities Need to Know about OCR HIPAA Auditā€‹sIatric Systems
Ā 

Ƅhnlich wie HIPAA Compliance for Developers (20)

Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Ā 
HxRefactored - TrueVault - Jason Wang
HxRefactored - TrueVault - Jason WangHxRefactored - TrueVault - Jason Wang
HxRefactored - TrueVault - Jason Wang
Ā 
An Overview of HIPAA Laws and Regulations.pdf
An Overview of HIPAA Laws and Regulations.pdfAn Overview of HIPAA Laws and Regulations.pdf
An Overview of HIPAA Laws and Regulations.pdf
Ā 
The importance of hipaa compliance and training
The importance of hipaa compliance and trainingThe importance of hipaa compliance and training
The importance of hipaa compliance and training
Ā 
Complying with HIPAA Security Rule
Complying with HIPAA Security RuleComplying with HIPAA Security Rule
Complying with HIPAA Security Rule
Ā 
Healthcare Compliance: HIPAA and HITRUST
Healthcare Compliance: HIPAA and HITRUSTHealthcare Compliance: HIPAA and HITRUST
Healthcare Compliance: HIPAA and HITRUST
Ā 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
Ā 
Comp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesComp8 unit6a lecture_slides
Comp8 unit6a lecture_slides
Ā 
Explaining the HIPAA Privacy[.docx
Explaining the HIPAA Privacy[.docxExplaining the HIPAA Privacy[.docx
Explaining the HIPAA Privacy[.docx
Ā 
Hipaa for business associates simple
Hipaa for business associates   simpleHipaa for business associates   simple
Hipaa for business associates simple
Ā 
Explain the security implications of HIPPA requirements for hospital.pdf
Explain the security implications of HIPPA requirements for hospital.pdfExplain the security implications of HIPPA requirements for hospital.pdf
Explain the security implications of HIPPA requirements for hospital.pdf
Ā 
Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017
Ā 
HIPAA Compliance Testing In Software Applications.pdf
HIPAA Compliance Testing In Software Applications.pdfHIPAA Compliance Testing In Software Applications.pdf
HIPAA Compliance Testing In Software Applications.pdf
Ā 
HealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTHealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUST
Ā 
HIPAA Compliant Salesforce Health Cloud ā€“ Why Healthcare Organizations Must C...
HIPAA Compliant Salesforce Health Cloud ā€“ Why Healthcare Organizations Must C...HIPAA Compliant Salesforce Health Cloud ā€“ Why Healthcare Organizations Must C...
HIPAA Compliant Salesforce Health Cloud ā€“ Why Healthcare Organizations Must C...
Ā 
Hi paa and eh rs
Hi paa and eh rsHi paa and eh rs
Hi paa and eh rs
Ā 
Dental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business AssociatesDental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business Associates
Ā 
Importance of HIPAA Compliance for Small Healthcare Clinics.pptx
Importance of HIPAA Compliance for Small Healthcare Clinics.pptxImportance of HIPAA Compliance for Small Healthcare Clinics.pptx
Importance of HIPAA Compliance for Small Healthcare Clinics.pptx
Ā 
HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations
Ā 
What Covered Entities Need to Know about OCR HIPAA Auditā€‹s
What Covered Entities Need to Know about OCR HIPAA Auditā€‹sWhat Covered Entities Need to Know about OCR HIPAA Auditā€‹s
What Covered Entities Need to Know about OCR HIPAA Auditā€‹s
Ā 

KĆ¼rzlich hochgeladen

Tirupati Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Tirupati Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetTirupati Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Tirupati Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetCall Girls Service
Ā 
bhopal Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
bhopal Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meetbhopal Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
bhopal Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetCall Girls Service
Ā 
Call Girl in Bangalore 9632137771 {LowPrice} ā¤ļø (Navya) Bangalore Call Girls ...
Call Girl in Bangalore 9632137771 {LowPrice} ā¤ļø (Navya) Bangalore Call Girls ...Call Girl in Bangalore 9632137771 {LowPrice} ā¤ļø (Navya) Bangalore Call Girls ...
Call Girl in Bangalore 9632137771 {LowPrice} ā¤ļø (Navya) Bangalore Call Girls ...mahaiklolahd
Ā 
Rajkot Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Rajkot Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetRajkot Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Rajkot Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetCall Girls Service
Ā 
Jalna Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Jalna Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetJalna Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Jalna Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetCall Girls Service
Ā 
Premium Call Girls Bangalore {7304373326} ā¤ļøVVIP POOJA Call Girls in Bangalor...
Premium Call Girls Bangalore {7304373326} ā¤ļøVVIP POOJA Call Girls in Bangalor...Premium Call Girls Bangalore {7304373326} ā¤ļøVVIP POOJA Call Girls in Bangalor...
Premium Call Girls Bangalore {7304373326} ā¤ļøVVIP POOJA Call Girls in Bangalor...Sheetaleventcompany
Ā 
ooty Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
ooty Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meetooty Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
ooty Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetCall Girls Service
Ā 
kochi Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
kochi Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meetkochi Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
kochi Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetCall Girls Service
Ā 
Hubli Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Hubli Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetHubli Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Hubli Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetCall Girls Service
Ā 
Best Lahore Escorts šŸ˜®ā€šŸ’Ø03250114445 || VIP escorts in Lahore
Best Lahore Escorts šŸ˜®ā€šŸ’Ø03250114445 || VIP escorts in LahoreBest Lahore Escorts šŸ˜®ā€šŸ’Ø03250114445 || VIP escorts in Lahore
Best Lahore Escorts šŸ˜®ā€šŸ’Ø03250114445 || VIP escorts in LahoreDeny Daniel
Ā 
Erode Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Erode Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetErode Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Erode Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetCall Girls Service
Ā 
nagpur Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
nagpur Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meetnagpur Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
nagpur Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetCall Girls Service
Ā 
neemuch Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
neemuch Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meetneemuch Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
neemuch Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetCall Girls Service
Ā 
Vip Call Girls Makarba šŸ‘™ 6367187148 šŸ‘™ Genuine WhatsApp Number for Real Meet
Vip Call Girls Makarba šŸ‘™ 6367187148 šŸ‘™ Genuine WhatsApp Number for Real MeetVip Call Girls Makarba šŸ‘™ 6367187148 šŸ‘™ Genuine WhatsApp Number for Real Meet
Vip Call Girls Makarba šŸ‘™ 6367187148 šŸ‘™ Genuine WhatsApp Number for Real MeetAhmedabad Call Girls
Ā 
Mathura Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Mathura Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetMathura Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Mathura Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetCall Girls Service
Ā 
Bhagalpur Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Bhagalpur Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetBhagalpur Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Bhagalpur Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetCall Girls Service
Ā 
Sangli Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Sangli Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetSangli Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Sangli Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetCall Girls Service
Ā 
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur RajasthanJaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthanindiancallgirl4rent
Ā 
Independent Call Girls Hyderabad šŸ’‹ 9352988975 šŸ’‹ Genuine WhatsApp Number for R...
Independent Call Girls Hyderabad šŸ’‹ 9352988975 šŸ’‹ Genuine WhatsApp Number for R...Independent Call Girls Hyderabad šŸ’‹ 9352988975 šŸ’‹ Genuine WhatsApp Number for R...
Independent Call Girls Hyderabad šŸ’‹ 9352988975 šŸ’‹ Genuine WhatsApp Number for R...Ahmedabad Call Girls
Ā 
Kolkata Call Girls Miss Inaaya ā¤ļø at @30% discount Everyday Call girl
Kolkata Call Girls Miss Inaaya ā¤ļø at @30% discount Everyday Call girlKolkata Call Girls Miss Inaaya ā¤ļø at @30% discount Everyday Call girl
Kolkata Call Girls Miss Inaaya ā¤ļø at @30% discount Everyday Call girlonly4webmaster01
Ā 

KĆ¼rzlich hochgeladen (20)

Tirupati Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Tirupati Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetTirupati Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Tirupati Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Ā 
bhopal Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
bhopal Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meetbhopal Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
bhopal Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Ā 
Call Girl in Bangalore 9632137771 {LowPrice} ā¤ļø (Navya) Bangalore Call Girls ...
Call Girl in Bangalore 9632137771 {LowPrice} ā¤ļø (Navya) Bangalore Call Girls ...Call Girl in Bangalore 9632137771 {LowPrice} ā¤ļø (Navya) Bangalore Call Girls ...
Call Girl in Bangalore 9632137771 {LowPrice} ā¤ļø (Navya) Bangalore Call Girls ...
Ā 
Rajkot Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Rajkot Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetRajkot Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Rajkot Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Ā 
Jalna Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Jalna Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetJalna Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Jalna Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Ā 
Premium Call Girls Bangalore {7304373326} ā¤ļøVVIP POOJA Call Girls in Bangalor...
Premium Call Girls Bangalore {7304373326} ā¤ļøVVIP POOJA Call Girls in Bangalor...Premium Call Girls Bangalore {7304373326} ā¤ļøVVIP POOJA Call Girls in Bangalor...
Premium Call Girls Bangalore {7304373326} ā¤ļøVVIP POOJA Call Girls in Bangalor...
Ā 
ooty Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
ooty Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meetooty Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
ooty Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Ā 
kochi Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
kochi Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meetkochi Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
kochi Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Ā 
Hubli Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Hubli Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetHubli Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Hubli Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Ā 
Best Lahore Escorts šŸ˜®ā€šŸ’Ø03250114445 || VIP escorts in Lahore
Best Lahore Escorts šŸ˜®ā€šŸ’Ø03250114445 || VIP escorts in LahoreBest Lahore Escorts šŸ˜®ā€šŸ’Ø03250114445 || VIP escorts in Lahore
Best Lahore Escorts šŸ˜®ā€šŸ’Ø03250114445 || VIP escorts in Lahore
Ā 
Erode Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Erode Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetErode Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Erode Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Ā 
nagpur Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
nagpur Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meetnagpur Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
nagpur Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Ā 
neemuch Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
neemuch Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meetneemuch Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
neemuch Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Ā 
Vip Call Girls Makarba šŸ‘™ 6367187148 šŸ‘™ Genuine WhatsApp Number for Real Meet
Vip Call Girls Makarba šŸ‘™ 6367187148 šŸ‘™ Genuine WhatsApp Number for Real MeetVip Call Girls Makarba šŸ‘™ 6367187148 šŸ‘™ Genuine WhatsApp Number for Real Meet
Vip Call Girls Makarba šŸ‘™ 6367187148 šŸ‘™ Genuine WhatsApp Number for Real Meet
Ā 
Mathura Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Mathura Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetMathura Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Mathura Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Ā 
Bhagalpur Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Bhagalpur Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetBhagalpur Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Bhagalpur Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Ā 
Sangli Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Sangli Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real MeetSangli Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Sangli Call Girls šŸ‘™ 6297143586 šŸ‘™ Genuine WhatsApp Number for Real Meet
Ā 
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur RajasthanJaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Ā 
Independent Call Girls Hyderabad šŸ’‹ 9352988975 šŸ’‹ Genuine WhatsApp Number for R...
Independent Call Girls Hyderabad šŸ’‹ 9352988975 šŸ’‹ Genuine WhatsApp Number for R...Independent Call Girls Hyderabad šŸ’‹ 9352988975 šŸ’‹ Genuine WhatsApp Number for R...
Independent Call Girls Hyderabad šŸ’‹ 9352988975 šŸ’‹ Genuine WhatsApp Number for R...
Ā 
Kolkata Call Girls Miss Inaaya ā¤ļø at @30% discount Everyday Call girl
Kolkata Call Girls Miss Inaaya ā¤ļø at @30% discount Everyday Call girlKolkata Call Girls Miss Inaaya ā¤ļø at @30% discount Everyday Call girl
Kolkata Call Girls Miss Inaaya ā¤ļø at @30% discount Everyday Call girl
Ā 

HIPAA Compliance for Developers

  • 1. HIPAA Compliance for Developers Breaking down the regulatory issues around building digital health apps for fun and proļ¬t. HIPAA compliant database-as-a-service
  • 2. HIPAA Compliance is a ā€Ø Brutal Time Suck! ! ā€œ[Building our own HIPAA compliant infrastructure] took upwards of 1,000 person-hours to ļ¬gure out HIPAA-compliance issues. This will continue to be an ongoing cost for us, because HIPAA is an ongoing law and it changes sometimes. It takes substantial auditing time and money. TrueVault would save us all that.ā€ ā€Ø Posted on Hacker News by jphā€Ø (Unsolicited comment. Not a customer.) HIPAA compliant database-as-a-service
  • 3. First oļ¬€, What is HIPAA? Health Insurance Portability and Accountability Act ā€¢ HIPAA sets the standard for protecting sensitive patient data. ā€¢ Covered Entities and their Business Associates need to protect the privacy and security of protected health information (PHI). ā€¢ Developed in 1996. HIPAA was initially created to help the public with insurance portability. In addition, they built a series of privacy tools to protect healthcare data. HIPAA compliant database-as-a-service
  • 4. What Does HIPAA Require? 1.Put safeguards in place to protect patient health information. 2.Reasonably limit use and sharing to the minimum necessary to accomplish your intended purpose. 3.Have agreements in place with service providers that perform covered functions. These agreements (BAAs) ensure that service providers (Business Associates) use, safeguard and disclose patient information properly. 4.Procedures to limit who can access patient health information, and training programs about how to protect patient health information. HIPAA compliant database-as-a-service
  • 5. The Four Rules of HIPAA Like the four horsemen, these are the major pieces that govern what you do and how you do it. 1.HIPAA Privacy Rule 2.HIPAA Security Rule 3.HIPAA Enforcement Rule 4.HIPAA Breach Notiļ¬cation Ruleā€Ø HIPAA compliant database-as-a-service Developers need to focus on the Technical and Physical safeguards outlined in the Security Rule.
  • 6. The Privacy Rule HIPAA compliant database-as-a-service Addresses the saving, accessing and sharing of medical and personal information of an individual, including a patientā€™s own right to access.
  • 7. The Security Rule HIPAA compliant database-as-a-service Outlines national security standards intended to protect health data created, received, maintained, or transmitted electronically.
  • 8. The Security Rule HIPAA compliant database-as-a-service September 23, 2013 Before Sept 23. Rules applied to hospitals, doctors, clinics, etc. After Sept 23. The rules now apply to anyone that touches PHI.ā€Ø ā€Ø (e.g. an IT company or a mHealth application that provides secure photo- sharing for physicians). Any company that deals with protected health information (PHI) must ensure that all the required physical, network, and process security measures are in place and followed.
  • 9. HIPAA compliant database-as-a-service ā€œDo I need to be HIPAA compliant?ā€
  • 10. HIPAA compliant database-as-a-service ā€œDo I need to be HIPAA compliant?ā€ If you handle PHI then you need to be HIPAA compliant. The HIPAA rules apply to both Covered Entities and their Business Associates
  • 11. What is Protected Health Information (PHI)? ā€¢ PHI is any information in a medical record that can be used to identify an individual, and that was created, used, or disclosed in the course of providing a healthcare service. ā€¢ Includes: ā€¢ Medical records ā€¢ Billing information ā€¢ Health insurance information ā€¢ Any individually identiļ¬able health information HIPAA compliant database-as-a-service
  • 12. Electronic Protected Health Information (EPHI) HIPAA compliant database-as-a-service All individually identiļ¬able health information that is created, maintained, or transmitted electronically.
  • 13. Covered Entity (CE) HIPAA compliant database-as-a-service ā€¢ Anyone who provides treatment, payment and operations in healthcare. ā€¢ Includes: ā€¢ Doctorā€™s oļ¬ƒce, dental oļ¬ƒces, clinics, psychologists, ā€¢ Nursing home, pharmacy, hospital or home healthcare agency ā€¢ Health plans, insurance companies, HMOs ā€¢ Government programs that pay for healthcare ā€¢ Health clearing houses
  • 14. Business Associate (BA) HIPAA compliant database-as-a-service ā€¢ Anyone who has access to patient information, whether directly, indirectly, physically or virtually. ā€¢ Any organization that provides support in the treatment, payment or operations ā€¢ Includes: ā€¢ IT providers, health applications ā€¢ Telephone service provider, document management and destruction ā€¢ Accountant, lawyer or other service provider Business associates have the responsibility to achieve and maintain HIPAA compliance in terms of all of the internal, administrative, and technical safeguards.
  • 15. Exceptions HIPAA compliant database-as-a-service ā€¢ Entities providing data transmission services, including services that involve temporary storage of PHI that is incident to the transmission (e.g. courier services and their electronic equivalents, such as ISPs or telecoms). While entities that are ā€œmere conduitsā€ for PHI are not Business Associates, the rules emphasize that this exception is narrow.
  • 16. HIPAA compliant database-as-a-service ā€œWho certiļ¬es HIPAA compliance?ā€
  • 17. HIPAA compliant database-as-a-service ā€œWho certiļ¬es HIPAA compliance?ā€ The short answer is no one.
  • 18. Who certiļ¬es HIPAA compliance? ā€¢ Unlike PCI, there is no one that can ā€œcertifyā€ that an organization is HIPAA compliant. ā€¢ The Oļ¬ƒce for Civil Rights (OCR) from the Department of Health and Human Services (HHS) is the federal governing body. HHS does not endorse or recognize the ā€œcertiļ¬cationsā€ made by private organizations. ā€¢ The evaluation standard in the Security Rule Ā§ 164.308(a)(8) requires you to perform a periodic technical and non-technical evaluation to make sure your security policies and procedures meet security requirements. ā€¢ But, HHS doesnā€™t care if the evaluation is performed internally or by an external organization. HIPAA compliant database-as-a-service
  • 19. Penalties & Fines ā€¢ Violations are expensive, to put it mildly. HIPAA compliant database-as-a-service
  • 20. HIPAA compliant database-as-a-service ā€œHow do I become HIPAA compliant?ā€
  • 21. HIPAA compliant database-as-a-service ā€œHow do I become HIPAA compliant?ā€ The HIPAA Security Rule requires appropriate Administrative, Physical, and Technical Safeguards to ensure the conļ¬dentiality, integrity, and security of protected health information (PHI).
  • 22. 3 Parts to the Security Rule 1.Administrative Safeguards 2.Technical Safeguards 3.Physical Safeguards HIPAA compliant database-as-a-service
  • 23. ā€œrequiredā€ vs. ā€œaddressableā€ ā€¢ Some implementation speciļ¬cations are ā€œrequiredā€ and others are ā€œaddressable.ā€ Required implementation speciļ¬cations must be implemented. ā€¢ Addressable implementation speciļ¬cations must be implemented if it is reasonable and appropriate to do so; your choice must be documented. ā€¢ It is important to remember that an addressable implementation speciļ¬cation is not optional. HIPAA compliant database-as-a-service When in doubt, you should just implement the addressable implementation speciļ¬cations. Most of them are best practices anyway.
  • 24. Administrative Safeguards The administrative components are really important when implementing a HIPAA compliance program; you are required to: 1.Assign a privacy oļ¬ƒcer 2.Complete a risk assessment annually 3.Implement employee training 4.Review policies and procedures 5.Execute Business Associate Agreements (BAAs) with all partners who handle protected health information (PHI) HIPAA compliant database-as-a-service
  • 25. Administrative Safeguards Companies who can help with the administrative components of a compliance program: ā€¢ Accountable -- http://accountablehq.com ā€¢ Compliance Helper -- http://www.compliancehelper.com ā€¢ Compliancy Group -- http://compliancy-group.com HIPAA compliant database-as-a-service
  • 26. Technical Safeguards 1.Access Control - Unique User Identiļ¬cation (required): Assign a unique name and/or number for identifying and tracking user identity. 2.Access Control - Emergency Access Procedure (required): Establish (and implement as needed) procedures for obtaining necessary ePHI during an emergency. 3.Access Control - Automatic Logoļ¬€ (addressable): Implement electronic procedures that terminate an electronic session after a predetermined time of inactivity. 4.Access Control - Encryption and Decryption (addressable): Implement a mechanism to encrypt and decrypt ePHI. HIPAA compliant database-as-a-service
  • 27. Technical Safeguards 5.Audit Controls (required): Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use ePHI. 6.Integrity - Mechanism to Authenticate ePHI (addressable): Implement electronic mechanisms to corroborate that ePHI has not been altered or destroyed in an unauthorized manner. 7.Authentication (required): Implement procedures to verify that a person or entity seeking access to ePHI is the one claimed. 8.Transmission Security - Integrity Controls (addressable): Implement security measures to ensure that electronically transmitted ePHI is not improperly modiļ¬ed without detection until disposed of. 9.Transmission Security - Encryption (addressable): Implement a mechanism to encrypt ePHI whenever deemed appropriate. HIPAA compliant database-as-a-service
  • 28. Physical Safeguards 1.Facility Access Controls - Contingency Operations (addressable): Establish (and implement as needed) procedures that allow facility access in support of restoration of lost data under the disaster recovery plan and emergency mode operations plan in the event of an emergency. 2.Facility Access Controls - Facility Security Plan (addressable): Implement policies and procedures to safeguard the facility and the equipment therein from unauthorized physical access, tampering, and theft. 3.Facility Access Controls - Access Control and Validation Procedures (addressable): Implement procedures to control and validate a personā€™s access to facilities based on their role or function, including visitor control, and control of access to software programs for testing and revision. 4.Facility Access Controls - Maintenance Records (addressable): Implement policies and procedures to document repairs and modiļ¬cations to the physical components of a facility which are related to security (e.g. hardware, walls, doors, and locks). 5.Workstation Use (required): Implement policies and procedures that specify the proper functions to be performed, the manner in which those functions are to be performed, and the physical attributes of the surroundings of a speciļ¬c workstation or class of workstation that can access ePHI. HIPAA compliant database-as-a-service HIPAA Compliant Hosting Providers can take care of some of the Physical Safeguards for you.
  • 29. Physical Safeguards 6.Workstation Security (required): Implement physical safeguards for all workstations that access ePHI, to restrict access to authorized users. 7.Device and Media Controls - Disposal (required): Implement policies and procedures to address the ļ¬nal disposition of ePHI, and/or the hardware or electronic media on which it is stored. 8.Device and Media Controls - Media Re-Use (required): Implement procedures for removal of ePHI from electronic media before the media are made available for re-use. 9.Device and Media Controls - Accountability (addressable): Maintain a record of the movements of hardware and electronic media and any person responsible therefore. 10.Device and Media Controls - Data Backup and Storage (addressable): Create a retrievable, exact copy of ePHI, when needed, before movement of equipment. HIPAA compliant database-as-a-service
  • 30. TrueVault Handles All Technical Requirements HIPAA compliant database-as-a-service Administrative Safeguards Technical Safeguards Encryption and Decryption, Key Management, Key Rotation, Access Control, Unique User Identiļ¬cation, Emergency Access, Automatic Logoļ¬€, Audit Controls, Mechanism to Authenticate Electronic PHI, Person or Entity Authentication, Transmission Security, Integrity Controls Physical Safeguards Facility Access Ctrl, Workstation Use and Security, Devices and Media Controls HIPAA Compliant Hosting TrueVault ā€¢ TrueVault handles both Technical and Physical Safeguards. ! ā€¢ Develop a healthcare application without building a HIPAA compliant infrastructure. ! ā€¢ FireHost and AWS have high minimum charges ($1,115 and $1,500) and oļ¬€er no help with the Technical Safeguards.
  • 31. How Does TrueVault Fit In? HIPAA compliant database-as-a-service ! ā€¢ Developers access TrueVault via a RESTful API and native clients. ! ā€¢ Typical integration takes days. TrueVault works just like any other API services. ! ā€¢ TrueVault provides all client- side and server-side functionalities required by HIPAA. Customer)Backend)Web) Services)) Standard)Database) TrueVault) (HIPAA)Compliant)) non@PHI)Data) PHI)Data) (REST)API))
  • 32. TrueVault Features HIPAA compliant database-as-a-service JSON Store The TrueVault JSON Store is a lightweight, document-oriented storage system, and enables persistent HIPAA compliant storage of JSON documents. BLOB Store The TrueVault BLOB (binary large object) Store oļ¬€ers HIPAA compliant binary storage for any ļ¬le format. This includes DICOM ļ¬les (e.g. X-Rays, CT Scans, MRIs), PDFs, scanned medical records, images, and videos. Encrypted Search Search encrypted data stored in TrueVault. Query (GET) documents by any ļ¬eld, not just the documentId.
  • 33. TrueVault Features HIPAA compliant database-as-a-service Browser-to-TrueVault Upload Browser-to-TrueVault direct ļ¬le upload and download web form. You can upload binary ļ¬les directly to TrueVaultā€™s BLOB Store using HTML forms. User Management and Authentication User Management console. You can create and manage users, groups, and permissions via TrueVault so that PHI never touches your stack. TrueVault provides identity and access management, plus 2-factor authentication out of the box. Use our identity API for custom access ļ¬‚ows or add Sign-In, Sign-Up, and My Account pages in seconds with our JavaScript user controls. Encryption and Decryption TrueVault encrypts all at-rest data with AES-256 and stores keys securely. Our infrastructure for healthcare data storage and transmission runs in a separate hosting environment inaccessible by our primary services.
  • 34. TrueVault Features HIPAA compliant database-as-a-service Audit Control Every user action and API call is automatically recorded for compliance. An audit log can be searched and retrieved via our API. Automatic Logoļ¬€ Conļ¬gure the automatic user session timeout window via our API or the Management Console. Emergency Access Easily add an Emergency Access Request page to your app with a CNAME record. Weā€™ll handle the authentication ļ¬‚ow for you, and track activities for compliance. Single-user credentials can also be created via the API for custom emergency workļ¬‚ows.
  • 35. TrueVault Features HIPAA compliant database-as-a-service Proactive Monitoring TrueVaultā€™s proprietary anomaly-based detection algorithm will alert you, or your customer, when abnormal user activity is detected. At-Rest Data Integrity A checksum is computed for every at-rest record, and the integrity of the data is continuously checked. Integrity Control and Encryption TrueVault regularly audits the details of our implementation: the certiļ¬cates we serve, our certiļ¬cate authorities, and our ciphers. We ensure that browsers and API clients interact with TrueVault over HTTPS only.
  • 36. HIPAA compliant database-as-a-service "Becoming HIPAA compliant as an early stage organization was a daunting task, until we found TrueVault! Their turn-key API has allowed us to check this box and get back to focusing on our core product and oļ¬€ering." Edith Elliottā€Ø CEO Noora Health
  • 37. Try TrueVault for Free HIPAA compliant database-as-a-service $0.001 / API call / monthFree for Development ā€¢ No credit card required. ā€¢ No time limit on the free trial period. ā€¢ Unlimited API calls and storage. ā€¢ But, no BAA and no insurance. API Calls Monthly Cost ā€Ø0 -100,000 $100 101,000 $101 250,000 $250 1,000,000 $1,000 ā€¢ Unlimited JSON documents ā€¢ Unlimited BLOB objects ā€¢ Business Associated Agreement ā€¢ Privacy/Data Breach Insurance ā€¢ Service Level Agreement Get Started