A2 CyberSecurity I Information Security Compliance
HIPAA Information Compliance
HIPAA Information Privacy
Maintaining data confidentiality of PHI is required for all organizations that store, process or transmit protected health information.
The HIPAA information privacy law was enacted in 1996 by the US congress to protect confidentiality and integrity of patient health information.
Who We Serve
We offer HIPAA compliance and to small to mid-size healthcare institutions in order to maintain data confidentiality, data integrity, data availability of PHI.
The Health Insurance Portability and Accountability Act was enacted by the U.S. Congress in 1996. HIPAA is designed to protect the use and disclosure of individual health information and other PHI. The HITECH was enacted under Title XIII of the American Recovery and Reinvestment Act of 2009 and expands upon HIPAA data privacy procedures.
HIPAA and HITECH Objectives
HIPAA main directive involves securing PHI data ( Protected Health Information ) when it is in use, in transit, or at rest. HITECH act of 2009 expands upon HIPAA and includes procedures and requirements for data breach disclosures, as well as addressing and establishing additional data regulations. The basic idea of HIPAA is that an individual who is a subject of individually identifiable health information should have:
Established procedures for the exercise of individual health information privacy rights.
The use and disclosure of individual health information should be authorized or required.
How Can We Help You Achive HIPAA Compliance?
A2 Cybersecurity offers a wide range of information security services to help you protect and safeguard protected health information, data confidentiality, data integrity and data availibility assurance.
Services Included in our Managed Security Service Platform that cover HIPAA Privacy:
Network vulnerability risk management - Risk Management is important to ensure that your network is safe from the low-hanging-fruit that automated hostile attacks most commonly search and exploit. Risk management helps safeguard data integrity and confidentiality, by preventing unauthorized access to sensitive data.
Network vulnerability risk management and removal ensure that your network is safe from the low-hanging-fruit that script kiddies and automated hostile attacks most commonly look for. Risk management helps safeguard data integrity and confidentiality, by preventing unauthorized access to sensitive data.
Instrusion Detection and Data Audit Trails - Intrusion detection systems cover traffic endpoint monitoring while traffic audit trails monitor and log access and modification of sensitive PHI data.
Tripwire Data Integrity Safeguard - Using sophisticated cryptographic hashing algorithims, a2 cybersecurity deploys automated file "tripwire" systems to monitor the integrity of PHI. We used the opensource utility RADMIND as well as commercial tripwire monitoring systems.
Want more technical details?
Read our service walkthroughs for more information.