SlideShare a Scribd company logo
1 of 1
Download to read offline
Importance of Being HIPAA / HITECH compliant
Managing the regulatory compliance requirements that governs IT security is an essential aspect of the IT security
and compliance activities. From HIPAA (Health Insurance Portability and Accountability Act), GLBA (Gramm-Leach
Bliley Act) to the Sarbanes-Oxley, IT security compliance programs have become very diverse these days. If you are
a large or a medium scale medical and healthcare provider, a hospital, or an institution that conducts medical
research and are involved with patient health information, then you are taken to be a “Business Associate” or a
“Covered Entity” under the HIPAA/HITECH compliance guidelines. In such cases, your organization needs to
maintain the IT security and compliance according to the policies that are set up by the HIPAA and HITECH acts.
HIPAA, known as Health Insurance Portability & Accountability Act of 1996 was set up with certain objectives in
mind. They are to :-
· Improve the continuity and portability of health insurance coverage
· Help in the easy exchange of electronic data
· Reduce costs through improved efficiency, effectiveness and standardization
· Ensure that all personal health records are confidential
HITCH, known as Health Information Technology for Economic and Clinical Health Act was established in 2009 and
made some essential changes to HIPAA. HITECH provides incentives for making use of health records and also has
implements strict notification processes. Simultaneously, it tightens the enforcement laws, maximizes the
penalties and alters the liabilities and accountabilities of the Covered Entities and Business Associates. According
to HITECH, a security breach means "The unauthorized acquisition, access, use, or disclosure of protected health
information, which compromises the security or privacy of protected health information— except where an
unauthorized person to whom such information is disclosed would not reasonably have been able to retain such
information”.
Keeping this in mind, an automated HIPAA/HITECH compliance management solution must comprise of the
following:-
· Ongoing security and compliance in addition to real-time monitoring
· Multiple regulation harmonization
· A “ready-to-use” packaged content, regulations, assessment questions, best practices and the capacity to
customize fast
· Provide extensive reports, such as compliance and risk reports on demand
· Single and centralized repository for every compliance related evidence
· Easy to use and implement
· Support both HIPAA and HITECH regulations.
· Comply with requirements for Covered Entities (CE's) and Business Associate (BA's).
According to a Forrester research, compliance of all types has become an important aspect of data security
programs. Most organizations that Forrester surveyed had agreed on the fact that the data privacy laws, data
security regulations and data breach guidelines are the main aspects of IT security and compliance programs. In
the recent times emphasis has also been given to IT-GRC (governance, risk and compliance) that organizations
cannot ignore.
Check out - IT Compliance Management

More Related Content

Viewers also liked

iPhone Armbinden
iPhone ArmbindeniPhone Armbinden
iPhone Armbindenallyvon
 
Supply Level Inc Power Point 2008 Breif
Supply Level Inc Power Point 2008 BreifSupply Level Inc Power Point 2008 Breif
Supply Level Inc Power Point 2008 Breifdontyers
 
Presentación tema 1. la artesanía. 2º eso. taller de artes plásticas.
Presentación tema 1. la artesanía. 2º eso. taller de artes plásticas.Presentación tema 1. la artesanía. 2º eso. taller de artes plásticas.
Presentación tema 1. la artesanía. 2º eso. taller de artes plásticas.alejandrosanmar
 
2010 comics toondoo1
2010 comics toondoo12010 comics toondoo1
2010 comics toondoo1nm48
 
R-ev euclidien orienté de dimension 2
R-ev euclidien orienté de dimension 2R-ev euclidien orienté de dimension 2
R-ev euclidien orienté de dimension 2Achraf Ourti
 
Vale do lobo, human centered design (engels)
Vale do lobo, human centered design (engels)Vale do lobo, human centered design (engels)
Vale do lobo, human centered design (engels)srprs.me
 
Las palmas spain (nx)
Las palmas  spain (nx)Las palmas  spain (nx)
Las palmas spain (nx)Rodica Madan
 
תושב ישראל לראשונה ועולים חדשים
תושב ישראל לראשונה ועולים חדשיםתושב ישראל לראשונה ועולים חדשים
תושב ישראל לראשונה ועולים חדשיםsagivbelzer
 
אודות יאללה באסטה - טעימות בשווקים של ישראל
אודות יאללה באסטה - טעימות בשווקים של ישראלאודות יאללה באסטה - טעימות בשווקים של ישראל
אודות יאללה באסטה - טעימות בשווקים של ישראלweiss2001
 
Expediente electronico judicial
Expediente electronico judicialExpediente electronico judicial
Expediente electronico judicialMavis Esther
 
Yo, mi región y mi cultura
Yo, mi región y mi culturaYo, mi región y mi cultura
Yo, mi región y mi culturawaltervasquez05
 
Обеспечение качества проектов средствами VSTS 2010
Обеспечение качества проектов средствами VSTS 2010Обеспечение качества проектов средствами VSTS 2010
Обеспечение качества проектов средствами VSTS 2010SQALab
 
Codigo civil comentado_-_tomo_ix_-_peruano_-_contratos_2da_parte
Codigo civil comentado_-_tomo_ix_-_peruano_-_contratos_2da_parteCodigo civil comentado_-_tomo_ix_-_peruano_-_contratos_2da_parte
Codigo civil comentado_-_tomo_ix_-_peruano_-_contratos_2da_partepadillaestudio
 
Synthèse les solitudes en 2010
Synthèse les solitudes en 2010Synthèse les solitudes en 2010
Synthèse les solitudes en 2010nathanseronet
 

Viewers also liked (19)

Pet visita[1]
Pet visita[1]Pet visita[1]
Pet visita[1]
 
iPhone Armbinden
iPhone ArmbindeniPhone Armbinden
iPhone Armbinden
 
Xero
XeroXero
Xero
 
Supply Level Inc Power Point 2008 Breif
Supply Level Inc Power Point 2008 BreifSupply Level Inc Power Point 2008 Breif
Supply Level Inc Power Point 2008 Breif
 
Graduacion uv paquetec
Graduacion uv paquetecGraduacion uv paquetec
Graduacion uv paquetec
 
Blogspot
BlogspotBlogspot
Blogspot
 
Presentación tema 1. la artesanía. 2º eso. taller de artes plásticas.
Presentación tema 1. la artesanía. 2º eso. taller de artes plásticas.Presentación tema 1. la artesanía. 2º eso. taller de artes plásticas.
Presentación tema 1. la artesanía. 2º eso. taller de artes plásticas.
 
2010 comics toondoo1
2010 comics toondoo12010 comics toondoo1
2010 comics toondoo1
 
R-ev euclidien orienté de dimension 2
R-ev euclidien orienté de dimension 2R-ev euclidien orienté de dimension 2
R-ev euclidien orienté de dimension 2
 
Vale do lobo, human centered design (engels)
Vale do lobo, human centered design (engels)Vale do lobo, human centered design (engels)
Vale do lobo, human centered design (engels)
 
Avoin data lyhyesti
Avoin data lyhyestiAvoin data lyhyesti
Avoin data lyhyesti
 
Las palmas spain (nx)
Las palmas  spain (nx)Las palmas  spain (nx)
Las palmas spain (nx)
 
תושב ישראל לראשונה ועולים חדשים
תושב ישראל לראשונה ועולים חדשיםתושב ישראל לראשונה ועולים חדשים
תושב ישראל לראשונה ועולים חדשים
 
אודות יאללה באסטה - טעימות בשווקים של ישראל
אודות יאללה באסטה - טעימות בשווקים של ישראלאודות יאללה באסטה - טעימות בשווקים של ישראל
אודות יאללה באסטה - טעימות בשווקים של ישראל
 
Expediente electronico judicial
Expediente electronico judicialExpediente electronico judicial
Expediente electronico judicial
 
Yo, mi región y mi cultura
Yo, mi región y mi culturaYo, mi región y mi cultura
Yo, mi región y mi cultura
 
Обеспечение качества проектов средствами VSTS 2010
Обеспечение качества проектов средствами VSTS 2010Обеспечение качества проектов средствами VSTS 2010
Обеспечение качества проектов средствами VSTS 2010
 
Codigo civil comentado_-_tomo_ix_-_peruano_-_contratos_2da_parte
Codigo civil comentado_-_tomo_ix_-_peruano_-_contratos_2da_parteCodigo civil comentado_-_tomo_ix_-_peruano_-_contratos_2da_parte
Codigo civil comentado_-_tomo_ix_-_peruano_-_contratos_2da_parte
 
Synthèse les solitudes en 2010
Synthèse les solitudes en 2010Synthèse les solitudes en 2010
Synthèse les solitudes en 2010
 

More from Aegify Inc.

Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Aegify Inc.
 
The UCF® Announces UCFinterchange to Support Cybersecurity
The UCF® Announces UCFinterchange to Support CybersecurityThe UCF® Announces UCFinterchange to Support Cybersecurity
The UCF® Announces UCFinterchange to Support CybersecurityAegify Inc.
 
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013Aegify Inc.
 
Webinar on HIPAA Omnibus Demystified
Webinar on HIPAA Omnibus DemystifiedWebinar on HIPAA Omnibus Demystified
Webinar on HIPAA Omnibus DemystifiedAegify Inc.
 
eGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks securityeGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks securityAegify Inc.
 
Security Posture Management Enters the Cloud
Security Posture Management Enters the CloudSecurity Posture Management Enters the Cloud
Security Posture Management Enters the CloudAegify Inc.
 
eGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyeGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyAegify Inc.
 
Implications of hipaa non compliance
Implications of hipaa non complianceImplications of hipaa non compliance
Implications of hipaa non complianceAegify Inc.
 
Address Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and ButsAddress Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and ButsAegify Inc.
 
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChanneleGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChannelAegify Inc.
 
IT Compliance and Security Solutions
IT Compliance and Security SolutionsIT Compliance and Security Solutions
IT Compliance and Security SolutionsAegify Inc.
 
SecureGRC SB™ HIPAA and HITECH
SecureGRC SB™ HIPAA and HITECHSecureGRC SB™ HIPAA and HITECH
SecureGRC SB™ HIPAA and HITECHAegify Inc.
 
Webinar on HIPAA/HITECH compliance services for healthcare industry
Webinar on HIPAA/HITECH compliance services for healthcare industryWebinar on HIPAA/HITECH compliance services for healthcare industry
Webinar on HIPAA/HITECH compliance services for healthcare industryAegify Inc.
 
Importance of Healthcare Compliance Solutions
Importance of Healthcare Compliance SolutionsImportance of Healthcare Compliance Solutions
Importance of Healthcare Compliance SolutionsAegify Inc.
 
Key featuresofcloudbasedsaas
Key featuresofcloudbasedsaasKey featuresofcloudbasedsaas
Key featuresofcloudbasedsaasAegify Inc.
 
NetWitness Decoder
NetWitness DecoderNetWitness Decoder
NetWitness DecoderAegify Inc.
 
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCSecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCAegify Inc.
 

More from Aegify Inc. (17)

Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines
 
The UCF® Announces UCFinterchange to Support Cybersecurity
The UCF® Announces UCFinterchange to Support CybersecurityThe UCF® Announces UCFinterchange to Support Cybersecurity
The UCF® Announces UCFinterchange to Support Cybersecurity
 
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
 
Webinar on HIPAA Omnibus Demystified
Webinar on HIPAA Omnibus DemystifiedWebinar on HIPAA Omnibus Demystified
Webinar on HIPAA Omnibus Demystified
 
eGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks securityeGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks security
 
Security Posture Management Enters the Cloud
Security Posture Management Enters the CloudSecurity Posture Management Enters the Cloud
Security Posture Management Enters the Cloud
 
eGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyeGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with Aegify
 
Implications of hipaa non compliance
Implications of hipaa non complianceImplications of hipaa non compliance
Implications of hipaa non compliance
 
Address Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and ButsAddress Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and Buts
 
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChanneleGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
 
IT Compliance and Security Solutions
IT Compliance and Security SolutionsIT Compliance and Security Solutions
IT Compliance and Security Solutions
 
SecureGRC SB™ HIPAA and HITECH
SecureGRC SB™ HIPAA and HITECHSecureGRC SB™ HIPAA and HITECH
SecureGRC SB™ HIPAA and HITECH
 
Webinar on HIPAA/HITECH compliance services for healthcare industry
Webinar on HIPAA/HITECH compliance services for healthcare industryWebinar on HIPAA/HITECH compliance services for healthcare industry
Webinar on HIPAA/HITECH compliance services for healthcare industry
 
Importance of Healthcare Compliance Solutions
Importance of Healthcare Compliance SolutionsImportance of Healthcare Compliance Solutions
Importance of Healthcare Compliance Solutions
 
Key featuresofcloudbasedsaas
Key featuresofcloudbasedsaasKey featuresofcloudbasedsaas
Key featuresofcloudbasedsaas
 
NetWitness Decoder
NetWitness DecoderNetWitness Decoder
NetWitness Decoder
 
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCSecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRC
 

Recently uploaded

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 

Recently uploaded (20)

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 

Importance of Being HIPAA / HITECH compliant

  • 1. Importance of Being HIPAA / HITECH compliant Managing the regulatory compliance requirements that governs IT security is an essential aspect of the IT security and compliance activities. From HIPAA (Health Insurance Portability and Accountability Act), GLBA (Gramm-Leach Bliley Act) to the Sarbanes-Oxley, IT security compliance programs have become very diverse these days. If you are a large or a medium scale medical and healthcare provider, a hospital, or an institution that conducts medical research and are involved with patient health information, then you are taken to be a “Business Associate” or a “Covered Entity” under the HIPAA/HITECH compliance guidelines. In such cases, your organization needs to maintain the IT security and compliance according to the policies that are set up by the HIPAA and HITECH acts. HIPAA, known as Health Insurance Portability & Accountability Act of 1996 was set up with certain objectives in mind. They are to :- · Improve the continuity and portability of health insurance coverage · Help in the easy exchange of electronic data · Reduce costs through improved efficiency, effectiveness and standardization · Ensure that all personal health records are confidential HITCH, known as Health Information Technology for Economic and Clinical Health Act was established in 2009 and made some essential changes to HIPAA. HITECH provides incentives for making use of health records and also has implements strict notification processes. Simultaneously, it tightens the enforcement laws, maximizes the penalties and alters the liabilities and accountabilities of the Covered Entities and Business Associates. According to HITECH, a security breach means "The unauthorized acquisition, access, use, or disclosure of protected health information, which compromises the security or privacy of protected health information— except where an unauthorized person to whom such information is disclosed would not reasonably have been able to retain such information”. Keeping this in mind, an automated HIPAA/HITECH compliance management solution must comprise of the following:- · Ongoing security and compliance in addition to real-time monitoring · Multiple regulation harmonization · A “ready-to-use” packaged content, regulations, assessment questions, best practices and the capacity to customize fast · Provide extensive reports, such as compliance and risk reports on demand · Single and centralized repository for every compliance related evidence · Easy to use and implement · Support both HIPAA and HITECH regulations. · Comply with requirements for Covered Entities (CE's) and Business Associate (BA's). According to a Forrester research, compliance of all types has become an important aspect of data security programs. Most organizations that Forrester surveyed had agreed on the fact that the data privacy laws, data security regulations and data breach guidelines are the main aspects of IT security and compliance programs. In the recent times emphasis has also been given to IT-GRC (governance, risk and compliance) that organizations cannot ignore. Check out - IT Compliance Management