Questions? Contact Us


Latest News

Featured News & Events

For HIPAA controls, how O can you go?

There's devil in the details of the various controls organizations use to ensure compliance with the requirements of the Health Insurance Portability and Accountability Act (HIPAA). We highlighted them all in a recent blog post if you want to read more.

Broken out as administrative, operational or technical, HIPAA controls refer to the various processes, procedures and system features that help organizations minimize risk by detecting, reducing or even eliminating the probability of a certain threats.

Basically, administrative controls are those dealing with human behavior, while operational controls speak to the risks inherent to the physical environment or location. And technical controls focus on – you guessed it – technology, from the computing hardware to the wireless network and more.

A risk manager typically rates the effectiveness of each implemented control using a process maturity scale:

  • Minimal - control is not fully implemented or is used in a way that requires reliance on individual discretion for its implementation.
  • Repeatable - control is implemented in a consistent manner that can be repeated by different individuals and in different situations, although not all associated procedures may be formally documented.
  • Defined - control is implemented and managed according to a standardized procedure that is well documented.
  • Benchmarked - control is implemented using repeatable, defined methods that conform to industry best practices.
  • Optimized - control is implemented using repeatable, defined methods that conform to industry best practices and which are routinely monitored to ensure control remains appropriate to a changing environment. At this level, controls are subject to continuous process improvement.

For an organization subject to HIPAA compliance, the controls can seem a bit daunting, and rightfully so, as they should not be taken lightly. At ZZ Servers, we help customers track more than 40 different processes, procedures and tests to gauge where they stand on the implementation of each of the 24 controls.

So how "optimized" does an organization need to be for a given control? And are any controls more important than others?

Recent headlines would suggest that device and media controls are among the hotter HIPAA items. Last month, it was revealed that wireless health services provider CardioNet reached a $2.5 million settlement with the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR). It seems that a CardioNet laptop computer with electronic personal health information (ePHI) was stolen from an employee's car.

In the ensuing investigation OCR reported that CardioNet did not have sufficient policies and procedures in place with respect to ePHI. In fact, those procedures were still in draft form and had not been implemented, much less optimized.

One can only wonder if CardioNet was somewhere above "minimal" on the process maturity scale for their device and media controls if the financial punishment would have been different for them.

But the larger point is that getting your HIPAA house in order is no small feat. And all of the controls are important.

Reaching "optimized" status across on any of the 24 HIPAA controls (and the 40 checklist items) is a tall order for smaller organizations, and that's where ZZ Servers can help.

We specialize in building HIPAA-compliant systems backed by a full set of managed service offerings where security is built in from the beginning. ZZ Servers takes the security of your business and the protected health information data seriously, and we know security inside and out.

It's this kind of mentality and expertise you want on your side to help you navigate the detailed controls and checklists that will boost your HIPAA compliance – without busting your budget.

Connect with us today and let us show you how we can help.

What providers really need to know about HIPAA Tit...
WannaCry Ransomware Teaches Painful Lesson in Patc...

Related Posts


Our Newsletter

Tag Cloud

safe computing Xen Linux members area Debian Shmoocon motivation Web Hosting smartphone business community compliance spoofing follow.The HIPAA Privacy Rule Email cell phone email Credit Cards cli kerio IT solutions management Internet infrastructure shared server Payment Card Industry shared hosting protect data embedded spf credit card Healthcare Records Compliance password Continuous Monitoring computer networks Assigned Names Cloud Computing ICANN HIPAA Solutions TiaraCon exchange cloud PCI Data Security Standards IT Solutions qsa health care providers IT services bash computer security assesment support PCI Audit Sysadmin credit cards stolen PCI Service Provider PCI DSS 3.2 David Zendzian data breach Vulnerability Interworx-CP personal information apache security BSides cyber National Cyber Security Awareness Month physical Home Depot Breach SSL Windows email accounts PCI healthcare solutions TLS Domani Names two factor authentication Presentation Ubuntu hosting control panel permissions phishing attacks cyber liability insurance HIDS IT trends vps vulnerability scanning dss lamp HIPAA solutions DEF CON Zendzian search HIPAA Control Panel Online Business mail server HIPPA command line VPS Servers business solitions log files dsbl pci complliant hosting Health Insurance Portability QSA Car Hacking cyber protection openssl infrastructure teensy phishing recovering data Internet Corporation Server Mangement information technology Medical Solutions Information Technology blackberry Alarm Las Vegas IT security shared folders Cybersecurity Business Solutions INFOSEC iphone Reports education Credit Card Security Business Solutions passwords amazon ec2 physical security cybersecurity vyatta router firewall filter security PCI HIPAA eCommerce Hackers PCI Solutions credit card payment business solutions InterWorx sender policy Announcement shared secure hosting Cybersecurity Charleston Medical Records spam Small Business ipad social engineering Firetalk security circles Hosting Internet business arduino World Backup Day PCI Compliance network video Accountability Act backup solutions businesses black friday eCommerce Solutions Geekend ZZ Servers caller-id change anti virus malicious software computing in the cloud OSSEC small business multi-factor authentication PCI compliance Security ZZ Servers Co-Founder cyber security cyber monday activesync CentOs Health Care Cybersecurity windows 7 compliant hosting