Google Answers Logo
View Question
 
Q: HIPPA data security ( Answered 5 out of 5 stars,   1 Comment )
Question  
Subject: HIPPA data security
Category: Business and Money > eCommerce
Asked by: dmaestro22-ga
List Price: $50.00
Posted: 05 Jun 2003 11:55 PDT
Expires: 05 Jul 2003 11:55 PDT
Question ID: 213511
HIPPA security question.

I have a small company that stores thousands of electronic medical
documents for doctors offices accessible through the Internet.  They
are physically located on servers in a back room of one doctors
office.  The doctors office is on the 4th floor of an office
condominium.  The condominium is secured from 7PM to 7AM with a
security system and accessible with security keys by tenants and
cleaning crews.  The individual doctors office is secured with steel
doors and dead bolt locks.

On the Internet, the records are stored on a server that is protected
by a firewall and accessible through the SSL port (443) with a
username and authentication.  All data is encrypted during
communication.  There is another port open that allows us to
administer the server remotely.  Minimum password length is only 4
characters.  No other ports are open to the server.

My question is what do we need to do to become HIPPA compliant in this
situation, both physically and from a data/Internet standpoint?

Request for Question Clarification by easterangel-ga on 05 Jun 2003 17:14 PDT
Hi! Since it will be difficult to provide a real good assessment
unless we are in the premises itself the question would be quite
difficult to answer. Furthermore, from my initial research HIPAA
security compliance usually takes months of planning and assessment
before a company identifies all the loopholes.

If you would like, here is my suggestion for answer. I was able to
find steps to be made in assessing a company's HIPAA security
compliance. In addition with this steps you can check with official
regulations if you have made HIPAA requirements. Would a combination
of such resources be enough as a legitimate answer?

Just let me know. :)

Clarification of Question by dmaestro22-ga on 05 Jun 2003 19:41 PDT
No, I'm not sure that would help me much.  I've found lots of
documentation talking about the "whole" issue, I am just wanting the
specific information in terms of how data needs to be protected, both
physically and digitally.  We are not a health care provider, health
plan, or clearinghouse and the majority of the HIPPA regulations do
not pertain to us.  We just want to know the specifics of the tiny bit
that does.

Thanks anyway.
Answer  
Subject: Re: HIPPA data security
Answered By: czh-ga on 06 Jun 2003 02:52 PDT
Rated:5 out of 5 stars
 
Hello dmaestro22-ga,

It sounds like you have a good understanding of the HIPAA requirements
that impact your operation and you have many of the requirements
covered. I’ve collected some resources to help you review all the
topics in the HHS HIPAA Security Matrix that is the summary outline of
the requirements in the law and the steps and methodologies necessary
to implement them. I’ve organized the research into the two categories
you specified – physical security and technical security. In addition,
I’ve included some general information to help you give an overview
and context to your plan of action.

This is a complex law and there are lots of resources available.
Please ask for clarification if you need additional information on
anything I’ve provided. Wishing you a smooth and easy HIPAA
implementation.

czh

===================
GENERAL INFORMATION
===================

http://www.idg.net/ic_1311671_10320_1-5449.html
How to ensure security compliance with HIPAA
MAY 01, 2003
This is a short article that gives brief highlights of what is
included in the three chief areas of data security: administrative,
physical and technical.

http://www.aahp.org/Content/NavigationMenu/Inside_AAHP/Healthplan_Magazine/January_February_2003__HIPAA_Security_Requirements.htm
Healthplan (January/February 2003)
HIPAA Security Requirements Plans prepare to comply
HIPAA Security Requirements -- Specific Requirements
The security rule's requirements are organized into four major
categories: Administrative procedures, physical safeguards, technical
security services, and technical security mechanisms. Implementation
features are provided for each category.

Administrative Procedures. These requirements are intended to guard
data integrity, confidentiality, and availability….

Physical Safeguards. These requirements are intended to protect
computer systems and the buildings in which they are housed. The
covered entity must assign responsibility for physical security to a
specific individual or organization. Covered entities must have media
control policies and procedures for a covered entity's incoming and
outgoing hardware and software - for example, diskettes and tapes.
Controls must also be implemented to prevent unauthorized physical
access to information. These should include such measures as "need to
know" procedures for personnel access and sign-in for visitors and
escort, if appropriate. ….

Technical Security Services. Among these requirements are audit
controls, so that the organization can identify suspect data access
activities, and controls that limit access to health information to
employees who have a business need to do so.
Implementation features that must be met are either context-based
access, role-based access, or user-based access, as well as procedures
for access in emergency situations….

Technical Security Mechanisms. Organizations are required to protect
health care information transmitted electronically over open networks,
such as the Internet, from hackers or other intruders. If
communications networks are used, covered entities must comply with
implementation features including integrity controls, to ensure that
stored or transmitted data are valid, and message authentication, to
assure that the messages sent and received are the same. …

http://www.sentineldata.com/hipaalinks.html
This is a large collection of links to help you with HIPAA
implementation
Other Standards Recognized by HIPAA
In an attempt to identify other existing security related standards,
as a component of the proposed security standard, HHS developed an
HIPAA Security Matrix. At some point, there will exist a unified
national standard. In the mean time, listed below are existing
standards that deal with Administrative Procedures to Guard Data
Integrity, Confidentiality, and Availability (superscript numbers
refer to identifiers in the HIPAA Security Matrix document).

http://www.healthtech.net/hipaa/hss-security-matrix/
HIPAA SECURITY MATRIX
This is a grid that sets out the Requirements of the four security
categories and for each lists the necessary Implementation action
steps.

http://www.computersecuritysolutions.net/SECMATRIX.htm
Security Matrix
This is a different, somewhat more detailed, version of the security
matrix.

http://www.hipaadvisory.com/sitemap/
HIPAAdvisory.com from Phoenix Health Systems
This is a very comprehensive site that gives you information about
every aspect of HIPAA compliance. You can scan the site index and find
the topics that are of special interest to you.

===================
PHYSICAL SAFEGUARDS
===================

You described some of the physical safeguards you have in place. These
articles give you bulleted lists of all elements that are included
under the physical safeguards requirements. Media controls, access
controls, risk assessment and disaster recovery are some major areas
that you should take a look at.

http://www.bricker.com/legalservices/practice/hcare/hipaa/164.310.asp
HHS Security Regulations -- Physical Safeguards - § 164.310

http://www.physicianofficemanager.net/hipaa.asp
HIPAA FAQs

Q: Does HIPAA require medical records to be under lock and key?

A: The proposed security rule lists the required physical safeguards
in section 142.308(b). The proposed security rule requires
organizations to implement the following physical safeguards and
security features:

1. Assigned security responsibility: The rule requires providers to
assign security responsibility to a specific individual or
organization and document that assignment. This responsibility
includes the management and supervision of: (1) the use of security
measures to protect data, and (2) the conduct of personnel in relation
to the protection of data.

2. Media controls: Providers must develop formal, documented policies
and procedures that govern the receipt and removal of hardware and
software (such as diskettes, tapes, computers). These controls include
the following mandatory implementation features:
·	Controlled access to media 
·	Accountability (tracking mechanism) 
·	Data backup 
·	Data storage 
·	Disposal 

3. Physical access controls:  Providers must document formal policies
and procedures for limiting physical access, while ensuring that
properly authorized personnel can work freely. These controls include
the following mandatory implementation features:
·	Disaster recovery 
·	Emergency mode operation 
·	Equipment control (into and out of site) 
·	A facility security plan 
·	Procedures for verifying access authorizations prior to physical
access
·	Maintenance records 
·	Need-to-know procedures for personnel access 
·	Sign-in for visitors and escorts, if appropriate 
·	Testing and revision 

4. Policy regarding workstation use: Each organization must have a
policy on workstation use which outlines the proper functions to be
performed (i.e., logging off before leaving a terminal unattended).

5. Secure workstation:  Each organization must put into place physical
safeguards to eliminate or minimize the possibility of unauthorized
access to information.  Make sure your computer systems require
log-ins and that screensavers kick in if there is even a very short
period of inactivity. Software systems that track access may become
necessary, and plans and providers probably will be required to keep
track of all external disclosures.

6. Security awareness training:  All employees, agents, and
contractors must be trained about security issues and the policies and
procedures in place to prevent breaches.

Q: How do I delete electronic medical records in compliance with HIPAA
?
A: The proposed security rule requires that providers outline a formal
process for removal of electronic data and the hardware on which it's
stored. Before your organization disposes, recycles, or donates any
magnetic computer media (floppy disks, tapes, hard drives, etc.), the
electronic data must be permanently removed. Permanent data removal
can be accomplished either by degaussing, using a strong magnetic
field to scramble the media, or by a process referred to as
Zeroization where zeros are written over the entire media record area.
Reformatting or deleting the data is not sufficient because it is not
permanent as there is technology that can rebuild file structure and
recover deleted data.

==========================================
TECHNICAL SECURITY SERVICES AND MECHANISMS
==========================================

http://www.oz-systems.com/Documents/HIPAA%20Compliance%20-%20External.pdf
Oz Systems Secure Data Center – Outlining HIPAA Compliance
This is a 6-page implementation plan for a data center from a
particular vendor. The requirements and possible solutions offered
will help you review your own situation and what you have in place and
what may need to be enhanced.

http://www.hipaadvisory.com/regs/securityandelectronicsign/technicalsecur.htm
3. Technical Security Services to Guard Data Integrity,
Confidentiality, and Availability
Covers requirements and implementation for Access control, Audit
controls, Authorization control, Data Authentication and Entity
authentication.

http://www.hipaadvisory.com/regs/securityandelectronicsign/technical.htm
4. Technical Security Mechanisms to Guard Against Unauthorized Access
to Data that is Transmitted over a Communications Network
Communications/network controls (If communications or networking is
employed, the following implementation features must be implemented:
Integrity controls, Message authentication. In addition, one of the
following implementation features must be implemented: Access
controls, Encryption. In addition, if using a network, the following
four implementation features must be implemented: Alarm, Audit trail,
Entity authentication, Event reporting).


===============
SEARCH STRATEGY
===============
HIPAA data security requirements
HIPAA physical security requirements
HIPAA  technical services mechanisms implementation
HIPAA security matrix
dmaestro22-ga rated this answer:5 out of 5 stars and gave an additional tip of: $10.00
Took a very complex topic and provided exactly what I was looking for.

Comments  
Subject: Re: HIPPA data security
From: czh-ga on 06 Jun 2003 09:12 PDT
 
Hello dmaestro22-ga,

I'm glad to hear that the answer was what you needed. Thank you very
much for the five stars and generous tip.

czh

Important Disclaimer: Answers and comments provided on Google Answers are general information, and are not intended to substitute for informed professional medical, psychiatric, psychological, tax, legal, investment, accounting, or other professional advice. Google does not endorse, and expressly disclaims liability for any product, manufacturer, distributor, service or service provider mentioned or any opinion expressed in answers or comments. Please read carefully the Google Answers Terms of Service.

If you feel that you have found inappropriate content, please let us know by emailing us at answers-support@google.com with the question ID listed above. Thank you.
Search Google Answers for
Google Answers  


Google Home - Answers FAQ - Terms of Service - Privacy Policy