
Encrypting health records
Patented next generation health data encryption, masking & key management
HIPAA Security Rule and HITECH compliance requires implementation of a mechanism to protect all electronic protected health information (ePHI). The HITECH Act requires the disclosure of data breaches of “unprotected” (unencrypted) personal health records (PHR), including those by business associates, vendors and related entities. More details about HIPAA are here.
To determine when information is “unsecured” and notification is required by the HHS and FTC rules, HHS is issuing an update to its guidance. This update to regulations specifies encryption and destruction as the technologies and methodologies that render protected health information unusable, unreadable, or indecipherable to unauthorized individuals.
Entities subject to the HHS and FTC regulations that secure health information as specified by the guidance through encryption or destruction are relieved from having to notify in the event of a breach of such information.
Best Practice Guidelines recommended by security experts for data at rest, transmission & sharing:
Encryption – Data that is encrypted is “Out of scope of the Law”. De-identification, access controls, key management, policy based, auditing and monitoring. Whilst there are many frameworks such as PCI DSS or ISO27001 or others many like the PCI DSS due to its prescriptive guidance.
Overall goals for organizations when implementing solution:
- Protect all 18 categories of ePHI data.
- Install solutions in a way that does not change business processes or require user re-training.
- Reduce initial and recurring compliance costs.
- Reduce operational costs.
- Ensure potential for security depth scaling as compliance requirements change
Read on and learn how Randtronics DPM address encryption-related business challenges.
- Name
- Address, City, County, ZIP Code
- Elements of dates
- Telephone numbers
- Fax numbers
- Email addresses
- SSN
- Medical record numbers
- Health plan beneficiary numbers
- Account numbers
- Certificate/license numbers
- Vehicle identifiers
- Device identifiers
- URLs
- IP Address
- Biometric identifiers
- Full face images
- Any other unique identifying data
Further reading:
Latest news and articles
5 Common Mistakes to Avoid When Encrypting Sensitive Files
In today’s digital landscape, data breaches are a constant threat. It seems like every day we hear about another organization that has fallen victim to
What Should You Do Immediately After a Ransomware Attack? A Step-by-Step Guide
Ransomware attacks are a nightmare for individuals and businesses alike. They can cripple operations, lead to significant financial losses, and damage your reputation. If you
How Can Ransomware Encryption Solutions Save Your Business During an Attack?
Cyberattacks are an unfortunate reality for businesses of all sizes. Among the most devastating are ransomware attacks, where criminals encrypt your data and demand payment
Our Customers







