Questions? Contact Us

 

Latest News

Featured News & Events

For HIPAA controls, how O can you go?

There's devil in the details of the various controls organizations use to ensure compliance with the requirements of the Health Insurance Portability and Accountability Act (HIPAA). We highlighted them all in a recent blog post if you want to read more.

Broken out as administrative, operational or technical, HIPAA controls refer to the various processes, procedures and system features that help organizations minimize risk by detecting, reducing or even eliminating the probability of a certain threats.

Basically, administrative controls are those dealing with human behavior, while operational controls speak to the risks inherent to the physical environment or location. And technical controls focus on – you guessed it – technology, from the computing hardware to the wireless network and more.

A risk manager typically rates the effectiveness of each implemented control using a process maturity scale:

  • Minimal - control is not fully implemented or is used in a way that requires reliance on individual discretion for its implementation.
  • Repeatable - control is implemented in a consistent manner that can be repeated by different individuals and in different situations, although not all associated procedures may be formally documented.
  • Defined - control is implemented and managed according to a standardized procedure that is well documented.
  • Benchmarked - control is implemented using repeatable, defined methods that conform to industry best practices.
  • Optimized - control is implemented using repeatable, defined methods that conform to industry best practices and which are routinely monitored to ensure control remains appropriate to a changing environment. At this level, controls are subject to continuous process improvement.

For an organization subject to HIPAA compliance, the controls can seem a bit daunting, and rightfully so, as they should not be taken lightly. At ZZ Servers, we help customers track more than 40 different processes, procedures and tests to gauge where they stand on the implementation of each of the 24 controls.

So how "optimized" does an organization need to be for a given control? And are any controls more important than others?

Recent headlines would suggest that device and media controls are among the hotter HIPAA items. Last month, it was revealed that wireless health services provider CardioNet reached a $2.5 million settlement with the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR). It seems that a CardioNet laptop computer with electronic personal health information (ePHI) was stolen from an employee's car.

In the ensuing investigation OCR reported that CardioNet did not have sufficient policies and procedures in place with respect to ePHI. In fact, those procedures were still in draft form and had not been implemented, much less optimized.

One can only wonder if CardioNet was somewhere above "minimal" on the process maturity scale for their device and media controls if the financial punishment would have been different for them.

But the larger point is that getting your HIPAA house in order is no small feat. And all of the controls are important.

Reaching "optimized" status across on any of the 24 HIPAA controls (and the 40 checklist items) is a tall order for smaller organizations, and that's where ZZ Servers can help.

We specialize in building HIPAA-compliant systems backed by a full set of managed service offerings where security is built in from the beginning. ZZ Servers takes the security of your business and the protected health information data seriously, and we know security inside and out.

It's this kind of mentality and expertise you want on your side to help you navigate the detailed controls and checklists that will boost your HIPAA compliance – without busting your budget.

Connect with us today and let us show you how we can help.

What providers really need to know about HIPAA Tit...
WannaCry Ransomware Teaches Painful Lesson in Patc...

Related Posts

 

Our Newsletter

Tag Cloud

vps Home Depot Breach cyber security smartphone credit card spoofing PCI Solutions InterWorx Las Vegas health care providers lamp vulnerability scanning motivation vyatta router firewall filter security PCI HIPAA cell phone email healthcare solutions Car Hacking IT services protect data DEF CON video activesync safe computing Cybersecurity Business Solutions computer networks TLS Shmoocon SSL Health Care Cybersecurity Security Health Insurance Portability support permissions kerio Interworx-CP social engineering Hackers Reports Linux Compliance business solutions change ipad Cloud Computing Assigned Names mail server Alarm Hosting IT security windows 7 hosting control panel Zendzian phishing cloud shared folders business community HIDS Online Business HIPPA VPS Servers Presentation teensy caller-id spam ZZ Servers Co-Founder assesment BSides TiaraCon Announcement personal information HIPAA openssl Vulnerability World Backup Day dsbl Healthcare Records QSA physical Payment Card Industry OSSEC management qsa eCommerce business solitions members area Sysadmin information technology ICANN Charleston shared server search credit card payment Internet HIPAA Solutions Email recovering data PCI Data Security Standards Xen blackberry data breach security bash exchange Domani Names iphone INFOSEC IT Solutions PCI PCI compliance eCommerce Solutions compliant hosting ZZ Servers phishing attacks Credit Card Security apache business small business Internet infrastructure cyber Internet Corporation Credit Cards infrastructure Debian PCI DSS 3.2 password command line pci complliant hosting Continuous Monitoring computer security shared hosting Control Panel malicious software PCI Audit cyber protection Small Business Medical Records National Cyber Security Awareness Month Windows CentOs Geekend compliance network Medical Solutions anti virus Web Hosting Business Solutions sender policy Information Technology IT amazon ec2 shared secure hosting cyber liability insurance spf embedded cli Firetalk PCI Compliance cybersecurity HIPAA solutions Server Mangement David Zendzian arduino trends backup solutions dss Cybersecurity businesses computing in the cloud physical security education IT solutions Accountability Act PCI Service Provider log files Ubuntu credit cards stolen follow.The HIPAA Privacy Rule