SlideShare a Scribd company logo
1 of 1
Download to read offline
Importance of Being HIPAA / HITECH compliant
Managing the regulatory compliance requirements that governs IT security is an essential aspect of the IT security
and compliance activities. From HIPAA (Health Insurance Portability and Accountability Act), GLBA (Gramm-Leach
Bliley Act) to the Sarbanes-Oxley, IT security compliance programs have become very diverse these days. If you are
a large or a medium scale medical and healthcare provider, a hospital, or an institution that conducts medical
research and are involved with patient health information, then you are taken to be a “Business Associate” or a
“Covered Entity” under the HIPAA/HITECH compliance guidelines. In such cases, your organization needs to
maintain the IT security and compliance according to the policies that are set up by the HIPAA and HITECH acts.
HIPAA, known as Health Insurance Portability & Accountability Act of 1996 was set up with certain objectives in
mind. They are to :-
· Improve the continuity and portability of health insurance coverage
· Help in the easy exchange of electronic data
· Reduce costs through improved efficiency, effectiveness and standardization
· Ensure that all personal health records are confidential
HITCH, known as Health Information Technology for Economic and Clinical Health Act was established in 2009 and
made some essential changes to HIPAA. HITECH provides incentives for making use of health records and also has
implements strict notification processes. Simultaneously, it tightens the enforcement laws, maximizes the
penalties and alters the liabilities and accountabilities of the Covered Entities and Business Associates. According
to HITECH, a security breach means "The unauthorized acquisition, access, use, or disclosure of protected health
information, which compromises the security or privacy of protected health information— except where an
unauthorized person to whom such information is disclosed would not reasonably have been able to retain such
information”.
Keeping this in mind, an automated HIPAA/HITECH compliance management solution must comprise of the
following:-
· Ongoing security and compliance in addition to real-time monitoring
· Multiple regulation harmonization
· A “ready-to-use” packaged content, regulations, assessment questions, best practices and the capacity to
customize fast
· Provide extensive reports, such as compliance and risk reports on demand
· Single and centralized repository for every compliance related evidence
· Easy to use and implement
· Support both HIPAA and HITECH regulations.
· Comply with requirements for Covered Entities (CE's) and Business Associate (BA's).
According to a Forrester research, compliance of all types has become an important aspect of data security
programs. Most organizations that Forrester surveyed had agreed on the fact that the data privacy laws, data
security regulations and data breach guidelines are the main aspects of IT security and compliance programs. In
the recent times emphasis has also been given to IT-GRC (governance, risk and compliance) that organizations
cannot ignore.
Check out - IT Compliance Management

More Related Content

Viewers also liked

iPhone Armbinden
iPhone ArmbindeniPhone Armbinden
iPhone Armbindenallyvon
 
Supply Level Inc Power Point 2008 Breif
Supply Level Inc Power Point 2008 BreifSupply Level Inc Power Point 2008 Breif
Supply Level Inc Power Point 2008 Breifdontyers
 
Presentación tema 1. la artesanía. 2º eso. taller de artes plásticas.
Presentación tema 1. la artesanía. 2º eso. taller de artes plásticas.Presentación tema 1. la artesanía. 2º eso. taller de artes plásticas.
Presentación tema 1. la artesanía. 2º eso. taller de artes plásticas.alejandrosanmar
 
2010 comics toondoo1
2010 comics toondoo12010 comics toondoo1
2010 comics toondoo1nm48
 
R-ev euclidien orienté de dimension 2
R-ev euclidien orienté de dimension 2R-ev euclidien orienté de dimension 2
R-ev euclidien orienté de dimension 2Achraf Ourti
 
Vale do lobo, human centered design (engels)
Vale do lobo, human centered design (engels)Vale do lobo, human centered design (engels)
Vale do lobo, human centered design (engels)srprs.me
 
Las palmas spain (nx)
Las palmas  spain (nx)Las palmas  spain (nx)
Las palmas spain (nx)Rodica Madan
 
תושב ישראל לראשונה ועולים חדשים
תושב ישראל לראשונה ועולים חדשיםתושב ישראל לראשונה ועולים חדשים
תושב ישראל לראשונה ועולים חדשיםsagivbelzer
 
אודות יאללה באסטה - טעימות בשווקים של ישראל
אודות יאללה באסטה - טעימות בשווקים של ישראלאודות יאללה באסטה - טעימות בשווקים של ישראל
אודות יאללה באסטה - טעימות בשווקים של ישראלweiss2001
 
Expediente electronico judicial
Expediente electronico judicialExpediente electronico judicial
Expediente electronico judicialMavis Esther
 
Yo, mi región y mi cultura
Yo, mi región y mi culturaYo, mi región y mi cultura
Yo, mi región y mi culturawaltervasquez05
 
Обеспечение качества проектов средствами VSTS 2010
Обеспечение качества проектов средствами VSTS 2010Обеспечение качества проектов средствами VSTS 2010
Обеспечение качества проектов средствами VSTS 2010SQALab
 
Codigo civil comentado_-_tomo_ix_-_peruano_-_contratos_2da_parte
Codigo civil comentado_-_tomo_ix_-_peruano_-_contratos_2da_parteCodigo civil comentado_-_tomo_ix_-_peruano_-_contratos_2da_parte
Codigo civil comentado_-_tomo_ix_-_peruano_-_contratos_2da_partepadillaestudio
 
Synthèse les solitudes en 2010
Synthèse les solitudes en 2010Synthèse les solitudes en 2010
Synthèse les solitudes en 2010nathanseronet
 

Viewers also liked (19)

Pet visita[1]
Pet visita[1]Pet visita[1]
Pet visita[1]
 
iPhone Armbinden
iPhone ArmbindeniPhone Armbinden
iPhone Armbinden
 
Xero
XeroXero
Xero
 
Supply Level Inc Power Point 2008 Breif
Supply Level Inc Power Point 2008 BreifSupply Level Inc Power Point 2008 Breif
Supply Level Inc Power Point 2008 Breif
 
Graduacion uv paquetec
Graduacion uv paquetecGraduacion uv paquetec
Graduacion uv paquetec
 
Blogspot
BlogspotBlogspot
Blogspot
 
Presentación tema 1. la artesanía. 2º eso. taller de artes plásticas.
Presentación tema 1. la artesanía. 2º eso. taller de artes plásticas.Presentación tema 1. la artesanía. 2º eso. taller de artes plásticas.
Presentación tema 1. la artesanía. 2º eso. taller de artes plásticas.
 
2010 comics toondoo1
2010 comics toondoo12010 comics toondoo1
2010 comics toondoo1
 
R-ev euclidien orienté de dimension 2
R-ev euclidien orienté de dimension 2R-ev euclidien orienté de dimension 2
R-ev euclidien orienté de dimension 2
 
Vale do lobo, human centered design (engels)
Vale do lobo, human centered design (engels)Vale do lobo, human centered design (engels)
Vale do lobo, human centered design (engels)
 
Avoin data lyhyesti
Avoin data lyhyestiAvoin data lyhyesti
Avoin data lyhyesti
 
Las palmas spain (nx)
Las palmas  spain (nx)Las palmas  spain (nx)
Las palmas spain (nx)
 
תושב ישראל לראשונה ועולים חדשים
תושב ישראל לראשונה ועולים חדשיםתושב ישראל לראשונה ועולים חדשים
תושב ישראל לראשונה ועולים חדשים
 
אודות יאללה באסטה - טעימות בשווקים של ישראל
אודות יאללה באסטה - טעימות בשווקים של ישראלאודות יאללה באסטה - טעימות בשווקים של ישראל
אודות יאללה באסטה - טעימות בשווקים של ישראל
 
Expediente electronico judicial
Expediente electronico judicialExpediente electronico judicial
Expediente electronico judicial
 
Yo, mi región y mi cultura
Yo, mi región y mi culturaYo, mi región y mi cultura
Yo, mi región y mi cultura
 
Обеспечение качества проектов средствами VSTS 2010
Обеспечение качества проектов средствами VSTS 2010Обеспечение качества проектов средствами VSTS 2010
Обеспечение качества проектов средствами VSTS 2010
 
Codigo civil comentado_-_tomo_ix_-_peruano_-_contratos_2da_parte
Codigo civil comentado_-_tomo_ix_-_peruano_-_contratos_2da_parteCodigo civil comentado_-_tomo_ix_-_peruano_-_contratos_2da_parte
Codigo civil comentado_-_tomo_ix_-_peruano_-_contratos_2da_parte
 
Synthèse les solitudes en 2010
Synthèse les solitudes en 2010Synthèse les solitudes en 2010
Synthèse les solitudes en 2010
 

More from Aegify Inc.

Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Aegify Inc.
 
The UCF® Announces UCFinterchange to Support Cybersecurity
The UCF® Announces UCFinterchange to Support CybersecurityThe UCF® Announces UCFinterchange to Support Cybersecurity
The UCF® Announces UCFinterchange to Support CybersecurityAegify Inc.
 
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013Aegify Inc.
 
Webinar on HIPAA Omnibus Demystified
Webinar on HIPAA Omnibus DemystifiedWebinar on HIPAA Omnibus Demystified
Webinar on HIPAA Omnibus DemystifiedAegify Inc.
 
eGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks securityeGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks securityAegify Inc.
 
Security Posture Management Enters the Cloud
Security Posture Management Enters the CloudSecurity Posture Management Enters the Cloud
Security Posture Management Enters the CloudAegify Inc.
 
eGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyeGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyAegify Inc.
 
Implications of hipaa non compliance
Implications of hipaa non complianceImplications of hipaa non compliance
Implications of hipaa non complianceAegify Inc.
 
Address Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and ButsAddress Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and ButsAegify Inc.
 
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChanneleGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChannelAegify Inc.
 
IT Compliance and Security Solutions
IT Compliance and Security SolutionsIT Compliance and Security Solutions
IT Compliance and Security SolutionsAegify Inc.
 
SecureGRC SB™ HIPAA and HITECH
SecureGRC SB™ HIPAA and HITECHSecureGRC SB™ HIPAA and HITECH
SecureGRC SB™ HIPAA and HITECHAegify Inc.
 
Webinar on HIPAA/HITECH compliance services for healthcare industry
Webinar on HIPAA/HITECH compliance services for healthcare industryWebinar on HIPAA/HITECH compliance services for healthcare industry
Webinar on HIPAA/HITECH compliance services for healthcare industryAegify Inc.
 
Importance of Healthcare Compliance Solutions
Importance of Healthcare Compliance SolutionsImportance of Healthcare Compliance Solutions
Importance of Healthcare Compliance SolutionsAegify Inc.
 
Key featuresofcloudbasedsaas
Key featuresofcloudbasedsaasKey featuresofcloudbasedsaas
Key featuresofcloudbasedsaasAegify Inc.
 
NetWitness Decoder
NetWitness DecoderNetWitness Decoder
NetWitness DecoderAegify Inc.
 
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCSecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCAegify Inc.
 

More from Aegify Inc. (17)

Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines
 
The UCF® Announces UCFinterchange to Support Cybersecurity
The UCF® Announces UCFinterchange to Support CybersecurityThe UCF® Announces UCFinterchange to Support Cybersecurity
The UCF® Announces UCFinterchange to Support Cybersecurity
 
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
 
Webinar on HIPAA Omnibus Demystified
Webinar on HIPAA Omnibus DemystifiedWebinar on HIPAA Omnibus Demystified
Webinar on HIPAA Omnibus Demystified
 
eGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks securityeGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks security
 
Security Posture Management Enters the Cloud
Security Posture Management Enters the CloudSecurity Posture Management Enters the Cloud
Security Posture Management Enters the Cloud
 
eGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyeGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with Aegify
 
Implications of hipaa non compliance
Implications of hipaa non complianceImplications of hipaa non compliance
Implications of hipaa non compliance
 
Address Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and ButsAddress Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and Buts
 
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChanneleGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
 
IT Compliance and Security Solutions
IT Compliance and Security SolutionsIT Compliance and Security Solutions
IT Compliance and Security Solutions
 
SecureGRC SB™ HIPAA and HITECH
SecureGRC SB™ HIPAA and HITECHSecureGRC SB™ HIPAA and HITECH
SecureGRC SB™ HIPAA and HITECH
 
Webinar on HIPAA/HITECH compliance services for healthcare industry
Webinar on HIPAA/HITECH compliance services for healthcare industryWebinar on HIPAA/HITECH compliance services for healthcare industry
Webinar on HIPAA/HITECH compliance services for healthcare industry
 
Importance of Healthcare Compliance Solutions
Importance of Healthcare Compliance SolutionsImportance of Healthcare Compliance Solutions
Importance of Healthcare Compliance Solutions
 
Key featuresofcloudbasedsaas
Key featuresofcloudbasedsaasKey featuresofcloudbasedsaas
Key featuresofcloudbasedsaas
 
NetWitness Decoder
NetWitness DecoderNetWitness Decoder
NetWitness Decoder
 
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCSecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRC
 

Recently uploaded

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Importance of Being HIPAA / HITECH compliant

  • 1. Importance of Being HIPAA / HITECH compliant Managing the regulatory compliance requirements that governs IT security is an essential aspect of the IT security and compliance activities. From HIPAA (Health Insurance Portability and Accountability Act), GLBA (Gramm-Leach Bliley Act) to the Sarbanes-Oxley, IT security compliance programs have become very diverse these days. If you are a large or a medium scale medical and healthcare provider, a hospital, or an institution that conducts medical research and are involved with patient health information, then you are taken to be a “Business Associate” or a “Covered Entity” under the HIPAA/HITECH compliance guidelines. In such cases, your organization needs to maintain the IT security and compliance according to the policies that are set up by the HIPAA and HITECH acts. HIPAA, known as Health Insurance Portability & Accountability Act of 1996 was set up with certain objectives in mind. They are to :- · Improve the continuity and portability of health insurance coverage · Help in the easy exchange of electronic data · Reduce costs through improved efficiency, effectiveness and standardization · Ensure that all personal health records are confidential HITCH, known as Health Information Technology for Economic and Clinical Health Act was established in 2009 and made some essential changes to HIPAA. HITECH provides incentives for making use of health records and also has implements strict notification processes. Simultaneously, it tightens the enforcement laws, maximizes the penalties and alters the liabilities and accountabilities of the Covered Entities and Business Associates. According to HITECH, a security breach means "The unauthorized acquisition, access, use, or disclosure of protected health information, which compromises the security or privacy of protected health information— except where an unauthorized person to whom such information is disclosed would not reasonably have been able to retain such information”. Keeping this in mind, an automated HIPAA/HITECH compliance management solution must comprise of the following:- · Ongoing security and compliance in addition to real-time monitoring · Multiple regulation harmonization · A “ready-to-use” packaged content, regulations, assessment questions, best practices and the capacity to customize fast · Provide extensive reports, such as compliance and risk reports on demand · Single and centralized repository for every compliance related evidence · Easy to use and implement · Support both HIPAA and HITECH regulations. · Comply with requirements for Covered Entities (CE's) and Business Associate (BA's). According to a Forrester research, compliance of all types has become an important aspect of data security programs. Most organizations that Forrester surveyed had agreed on the fact that the data privacy laws, data security regulations and data breach guidelines are the main aspects of IT security and compliance programs. In the recent times emphasis has also been given to IT-GRC (governance, risk and compliance) that organizations cannot ignore. Check out - IT Compliance Management