Necessity of HIPPA-Compliance for storing Healthcare Data
In an era where healthcare operators are fast falling behind if they aren’t on the internet, taking shortcuts for protected health information (PHI) becomes commonplace. While standard web hosting servers are capable of storing and serving healthcare data, they are incapable of providing services complying with the Health Insurance Portability and Accountability Act (HIPAA), or even providing a platform for a skilled developer to build HIPPA-compliant services and applications. The fundamental requirements of HIPPA compliance include transport and storage encryption, authorization, backups, and data integrity and disposal. HIPPA non-compliance should not be taken lightly, as it could lead to large fines, or, in extreme cases, imprisonment.
HIPPA-compliant hosting providers provide a foundation to build HIPPA-compliant services. HIPPA’s authorization requirement stipulates that only authorized people can access PHI—this is done through audited access controls. The data thus remains protected from people not having permission from inside the data center or over the network.
Healthcare data storage must be done carefully to ensure that it is not altered or tampered with. The easiest way to prevent data tampering is by encryption—this, however, is not a service that most web hosts provide easily. Ensuring whole-disk encryption is not only safer but also reduces complexity—it should become a standard part of HIPPA-compliant hosting plans.
Companies that process or store PHI information need to either build a HIPPA-compliant hosting platform or use the services of a third-party vendor providing the same. The second is the preferred option because only an experienced hosting provider can provide a trustworthy HIPPA business associate agreement.
While HIPPA-compliant hosting appears similar to standard web hosting, building a reliable platform empowering healthcare professionals in building HIPPA-compliant services requires effort.
By Chris Tjotjos, VP, Cisco Solutions Practice, Black Box...
By Laura Jackson, Sr. Manager-Risk Management, ABS Consulting
By Jason Cradit, VP of Information Systems, Willbros Group
By Steve Garske, Ph.D., Senior Vice President & Chief...
By Roman Trakhtenberg, CEO, Luxoft
By Renee P Wynn, CIO, NASA
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Andrew Macaulay, CTO, Topgolf Entertainment Group
By Dominic Casserley, President and Deputy CEO, Willis...
By Dave Nelson, SVP-Portfolio Lead, Avanade, Inc.
By Michael Cross, SVP & CIO, CommScope Holding Company Inc.
By Pauly Comtois, VP DevOps, Hearst Business Media
By Dan Adam, CIO, Extreme Networks
By Matt Schlabig, CIO, Worthington Industries
By David Tamayo, CIO, DCS Corporation
By Scott Cardenas, CIO, City and County of Denver
By Marc Kermisch, VP & CIO, Red Wing Shoe Co.
By Brian Drozdowicz, VP, Digital Services, Siemens...
By Les Ottolenghi, EVP and CIO, Caesars Entertainment