Thursday, April 3, 2014

Data In Motion: Secure Your Organization ' s Information

Data In Motion: Secure Your Organization ' s Information




As the United States healthcare system continues to move toward Electronic Health Records ( EHR ) in compliance with the Health Information Technology for Economic and Clinical Health ( HITECH ) Act of 2009, questions about security of information never cease to be addressed. The US Health Insurance Portability and Trouble Act ( HIPAA ) hurting for rigorous care in the mobilization of safe health information ( PHI ).

One of the benefits of electronic records is the ability to quickly transmit data across the country or around the world. Whenever safe health information ( PHI ) is being transmitted electronically to a third party via email, FTP or other mold of communication, it is considered " data in motion. " The National Institute of Standards and Technology ( NIST ) and HIPAA warrant that the movement of PHI via electronic means must shake hands with their standards for security. Unfortunately, it is far too easy for unsecure products to be breached and identifying information used in malicious ways. HIPAA and NIST are concerned that good practices are practical and that important patient information is defended.

Further, the HITECH Act ( ARRA ) of 2009 beneath the guidance of the Department of Health and Human Services ( HHS ) has outlined a " safe harbor " in which breached information does not need to be reported. Essentially, if PHI is bootless, indecipherable or illegible to unauthorized individuals, covered physicians and hospitals will not be question to HITECH ' s schism intelligence requirements. Encryption and curtains are two options for reading PHI ineffectual, scribbed or illegible to unauthorized individuals.

PHI is exact encrypted if an algorithmic process has been used to explain the freight essentially indiscreet without the use of a confidential process or key. For " data at keep at " ( stored on databases and tier systems ), the NIST has different requirements and guidelines than for " data in motion. "

Some companies offer a customizable shot for hospitals and special practices that meets and exceeds the NIST standards for protecting " data in motion. " They also offer encryption that allows your metropolitan hospital or rural community clinic to take advantage of the Safe Harbor Rule and exempts your organization from having to report a breach to HHS.

Currently, the biggest threat to HITECH compliance is protection of PHI en wayfaring across the country or around the world via email, FTP or other electronic silhouette of communication. A large proportion of breaches that have being occurred involve some type of information moving from one entity to major. Protect your healthcare organization with software allied as Encrypt - A - Note and make sure your " data in motion " needs are met.

No comments:

Post a Comment