Tuesday, November 26, 2013

Data In Motion: Secure Your Organization ' s Information

Data In Motion: Secure Your Organization ' s Information




As the United States healthcare system continues to proceeding toward Electronic Health Records ( EHR ) in compliance with the Health Information Technology for Economic and Clinical Health ( HITECH ) Act of 2009, questions about security of information extend to be addressed. The US Health Insurance Portability and Hindrance Act ( HIPAA ) need rigorous care in the exertion of safe health information ( PHI ).

One of the benefits of electronic records is the ability to quickly transmit data across the country or around the world. Whenever defended health information ( PHI ) is being transmitted electronically to a third party via email, FTP or other articulation of communication, it is considered " data in motion. " The National Institute of Standards and Technology ( NIST ) and HIPAA warrant that the movement of PHI via electronic means must allow with their standards for security. Unfortunately, it is far too easy for unsecure commodities to be breached and identifying information used in malicious ways. HIPAA and NIST are concerned that good practices are empitic and that important patient information is defended.

Further, the HITECH Act ( ARRA ) of 2009 below the guidance of the Department of Health and Human Services ( HHS ) has outlined a " safe harbor " in which breached information does not need to be reported. Essentially, if PHI is inept, hieroglyphic or unreadable to unauthorized individuals, covered physicians and hospitals will not be concern to HITECH ' s cleft inside story requirements. Encryption and silence are two options for itemizing PHI impractical, scribbed or indecipherable to unauthorized individuals.

PHI is categorical encrypted if an algorithmic process has been used to expound the freight essentially sluggish without the use of a confidential process or key. For " data at outlast " ( stored on databases and progression systems ), the NIST has different requirements and guidelines than for " data in motion. "

Some companies offer a customizable energy for hospitals and marked practices that meets and exceeds the NIST standards for protecting " data in motion. " They also offer encryption that allows your metropolitan hospital or rural community clinic to take advantage of the Safe Harbor Rule and exempts your organization from having to report a breach to HHS.

Currently, the biggest threat to HITECH compliance is protection of PHI en drive across the country or around the world via email, FTP or other electronic mold of communication. A mammoth rate of breaches that have going on occurred involve some type of information moving from one entity to larger. Protect your healthcare organization with software double as Encrypt - A - Note and guard your " data in motion " needs are met.

No comments:

Post a Comment