Compliance with the HIPAA Security Rule
Auditors are beginning to move beyond the application layer and demanding actual data security
The HIPAA Security Rule establishes national standards to protect individuals' medical records and other personal health information (PHI). It applies to health plans, health care clearinghouses, and health care providers. The Security Rule requires covered entities to maintain reasonable and appropriate administrative, technical, and physical safeguards for protecting PHI. Auditors have become more sophisticated; they are moving beyond application level safeguards and demanding to see security applied to the actual data stores. As healthcare organizations have embraced cloud technologies for scale and efficiency it has presented new compliance reporting challenges. The Security Rule still applies to all data stores - whether they are located on premises or in the cloud:The new healthcare compliance imperative: protect data at the source
Healthcare organizations' complex IT environments demand new data security requirements to protect data at the source. You need to rely on a unified data-centric platform that provides the broadest coverage across a broad range of data repositories - on-premises data stores, geographically distributed systems, and cloud/multi-cloud/hybrid-cloud deployments - to coordinate policies, monitoring and enforcement to eliminate any gaps that could leave data stores vulnerable to attack.-
EMR systems
-
DBaaS
-
On-premises data
-
Files
-
Data warehouse