{"id":2180,"date":"2011-09-05T08:12:47","date_gmt":"2011-09-05T08:12:47","guid":{"rendered":"https:\/\/www.empowerbpo.com\/blog\/?p=2180"},"modified":"2023-09-11T13:20:35","modified_gmt":"2023-09-11T13:20:35","slug":"how-to-evaluate-a-hipaa-security-compliant-data-center","status":"publish","type":"post","link":"https:\/\/www.empowerelearning.com\/blog\/how-to-evaluate-a-hipaa-security-compliant-data-center\/","title":{"rendered":"How to Evaluate a HIPAA Security Compliant Data Center"},"content":{"rendered":"<p>If you host your healthcare data with a data center, certain administrative, physical and technical safeguards should be in place, as defined by the Health Insurance Portability and Accountability Act (HIPAA) Security Rule.<\/p>\n<p>Although all service providers tout their data centers as secure, how do you confirm if it truly is\u00a0<a href=\"https:\/\/www.empowerbpo.com\/courses\/hipaa-and-patient-privacy\/\" rel=\"nofollow noopener\" target=\"_blank\"><b>HIPAA Security Rule compliant<\/b><\/a>?<\/p>\n<p>HIPAA sets the standard for protecting sensitive patient data. Under HIPAA there are two designations, Covered Entity and Business Associate. The Covered Entity being the provider of medical care or any entity that transmits EPHI. The Business Associate is any entity that provides services for a Covered Entity that may involve EPHI. The Health Information Technology and Economic Clinical Act (HITECH) was enacted in 2009 and raised the stakes for Business Associates in compliance to HIPAA basically putting them on par with Covered Entities. By managing servers containing EPHI, the data center hosting company is considered a Business Associate and must ensure all the required physical, network and process security measures are in place and followed.<\/p>\n<p><strong>The Minimum Safeguards<\/strong><\/p>\n<p>When evaluating providers, the following safeguards must be in place:<\/p>\n<p>\u2022\u00a0\u00a0\u00a0\u00a0<strong>Physical safeguards<\/strong>\u00a0&#8211; include limited facility access and control, with authorized access in place. All covered entities, or business associates, must have policies about use and access to workstations and electronic media. This requirement includes transferring, removing, disposing and re-using electronic media and EPHI.<br \/>\n\u2022\u00a0\u00a0\u00a0\u00a0<strong>Technical safeguards<\/strong>\u00a0&#8211; require access control to allow only authorized personnel to access electronic protected health data. Access control includes using unique user IDs, an emergency access procedure, automatic log off and encryption and decryption.<br \/>\n\u2022\u00a0\u00a0\u00a0\u00a0<strong>Audit reports (or tracking logs)\u00a0<\/strong>&#8211; must be implemented to keep records of activity on hardware and software. This procedure is especially useful to pinpoint the source or cause of any security violations.\u00a0 Solution providers should keep very detailed records in their building monitoring system, down to the second when somebody accessed a badge reader on a door.<br \/>\n\u2022\u00a0\u00a0\u00a0\u00a0<strong>Technical policies<\/strong>\u00a0&#8211; should also cover integrity controls, or measures put in place to confirm that EPHI hasn\u2019t been altered or destroyed. IT disaster recovery and offsite backup are keys to ensure any electronic media errors or failures can be quickly remedied and patient health information can be recovered accurately and intact.\u00a0 A HIPAA security compliant data center must ensure crucial healthcare data it handles for providers and insurers will be safe and protected in the event of a disaster.<br \/>\n\u2022\u00a0\u00a0\u00a0\u00a0<strong>Network, or transmission, security<\/strong>\u00a0&#8211; is the last technical safeguard required of HIPAA security compliant hosts to protect against unauthorized public access of PHI. This requirement covers all methods of transmitting data, including email, Internet, or even over a private cloud network.<\/p>\n<p><strong>Turn to Audit Reports<\/strong><\/p>\n<p>The rapid adoption of\u00a0<b><a href=\"https:\/\/www.empowerbpo.com\/courses\/family-care-clinics\/\" rel=\"nofollow noopener\" target=\"_blank\">healthcare<\/a>\u00a0<\/b>technology and applications such as Electronic Health Records creates new challenges for Healthcare IT planners as they must undergo costly upgrades to ensure HIPAA security compliance. Outsourcing data storage to data center hosting companies can be a cost effective alternative.\u00a0 The best way to evaluate the required security is in place is to review the data center\u2019s SAS-70 (recently changed to SSAE 16) and PCI-DSS audit reports.\u00a0 The audit reports should specifically cover the processes for the data center\u2019s physical security, network security and access control to the data on the server.<\/p>\n<p>A SAS-70 (statement of auditing standards) designation confirms the data center complies with established auditing controls.\u00a0 The audit is conducted by an independent, third-party CPA. SAS-70 certification includes two types of audit reports:<\/p>\n<p>\u2022\u00a0\u00a0\u00a0\u00a0<strong>Type I<\/strong>\u00a0\u2013 The first step in the auditing process evaluates the organization\u2019s description of their internal controls.<\/p>\n<p>\u2022\u00a0\u00a0\u00a0\u00a0<strong>Type II<\/strong>\u00a0\u2013 Includes the Type I report and it evaluates how the controls were operating from when the Type I audit was first conducted to six months thereafter.<\/p>\n<p>The final deliverable for the audit is commonly called the SAS 70 Service Auditor\u2019s Report, a lengthy document which contains a multitude of information regarding the service organization, its overall control structure, framework, test of controls (if a Type II audit), along with adjunct and supporting documentation, such as the Independent Accountant (or Service Auditor\u2019s) Report, possible exceptions noted during testing, and any additional information provided by the service organization.<\/p>\n<p>Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards. The standards were created to prevent card holder fraud which is critical as more patients pay by credit cards. The following table shows the requirements:<\/p>\n<table style=\"height: 733px;\" border=\"1\" width=\"753\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td>\n<div align=\"center\"><strong>Control Objectives<\/strong><\/div>\n<\/td>\n<td>\n<div style=\"text-align: center;\" align=\"center\"><strong>PCI DSS Requirements<\/strong><\/div>\n<\/td>\n<\/tr>\n<tr>\n<td>Build and Maintain a Secure Network<\/td>\n<td>1. Install and maintain a\u00a0<a title=\"Firewall (computing)\" href=\"http:\/\/en.wikipedia.org\/wiki\/Firewall_%28computing%29\" rel=\"nofollow noopener\" target=\"_blank\">firewall<\/a>\u00a0configuration to protect cardholder data<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td>2. Do not use vendor-supplied defaults for system\u00a0<a title=\"Password\" href=\"http:\/\/en.wikipedia.org\/wiki\/Password\" rel=\"nofollow noopener\" target=\"_blank\">passwords<\/a>\u00a0and other security parameters<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>Protect Cardholder Data<\/td>\n<td>3. Protect stored cardholder data<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td>4. Encrypt transmission of cardholder data across open, public networks<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>Maintain a Vulnerability Management Program<\/td>\n<td>5. Use and regularly update anti-virus software on all systems commonly affected by malware<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td>6. Develop and maintain secure systems and applications<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>Implement Strong Access Control Measures<\/td>\n<td>7. Restrict access to cardholder data by business need-to-know<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td>8. Assign a unique ID to each person with computer access<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td>9. Restrict physical access to cardholder data<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>Regularly Monitor and Test Networks<\/td>\n<td>10. Track and monitor all access to network resources and cardholder data<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td>11. Regularly test security systems and processes<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>Maintain an Information Security Policy<\/td>\n<td>12. Maintain a policy that addresses information security<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>The Staggering Price of Non-Compliance<\/strong><\/p>\n<p>The HIPAA Security Rule went into effect in 2005 but its enforcement and the financial impact of violations have been hard to pinpoint in the past.\u00a0 The HITECH act of 2009 changed that and recent cases show violations can be expensive.<\/p>\n<p>Massachusetts General Hospital discovered Health and Human Services is getting serious about HIPAA violations. The hospital agreed to pay the $1 million to settle potential HIPAA violations.\u00a0 Massachusetts General\u2019s case involved the loss of electronic protected health information (EPHI) of 192 patients.\u00a0 The loss works out to over $5000 per record.<\/p>\n<p>Healthcare organizations must ensure their data centers meet the guidelines for the HIPAA Security Rule and have the required safeguards in place.\u00a0 Although there is no widely accepted HIPAA Security certification program, the SAS-70\/PCI-DSS certifications exceed the HIPAA security safeguard requirements and can help demonstrate compliance.\u00a0 Staying well informed of regulatory changes will help meet requirements and avoid expensive penalties.<\/p>\n<p>This article was originally posted at \u00a0<a href=\"http:\/\/www.healthcareitnews.com\/blog\/how-evaluate-hipaa-security-compliant-data-center\" rel=\"nofollow noopener\" target=\"_blank\">http:\/\/www.healthcareitnews.com\/blog\/how-evaluate-hipaa-security-compliant-data-center<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you host your healthcare data with a data center, certain administrative, physical and technical safeguards should be in place, as defined by the Health Insurance Portability and Accountability Act (HIPAA) Security Rule. Although all service providers tout their data centers as secure, how do you confirm if it truly is\u00a0HIPAA Security Rule compliant? HIPAA [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[28,75,76,95],"class_list":["post-2180","post","type-post","status-publish","format-standard","hentry","category-hipaa","tag-hipaa-compliance-training","tag-hipaa-law","tag-hipaa-privacy-and-security-rule","tag-hipaa-security-standard"],"_links":{"self":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts\/2180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/comments?post=2180"}],"version-history":[{"count":0,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts\/2180\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/media?parent=2180"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/categories?post=2180"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/tags?post=2180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}