SlideShare a Scribd company logo
1 of 1
Download to read offline
SOS HIPAA STATEMENT

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was the
result of efforts by the federal government to ensure healthcare data practices
permitted ease for patients to move jobs, insurance and healthcare providers.

As defined by 45 CFR §164.312 of HHS’ HIPAA, SOS Online Backup assist healthcare
providers to be HIPAA compliant in the following ways:

•	   SOS	Online	Backup,	in	all	cases,	creates,	receives	and	transmits	only	encrypted	data.		             	
	    SOS	uses	a	three-tiered	AES	encryption	system	which	encrypts	data	on	the	user’s	
	    computer,	again	in	transit	and	finally	when	at	rest	in	storage	at	SOS’s	datacenters.

•	   This	data	cannot	be	read	while	in	transit,	or	even	on	the	SOS	servers,	as	long	as	the		             	
	    user	(health	care	provider)	does	not	compromise	the	password	(for	example,	writing		 	              	
	    the	password	on	a	sticky	note	and	attaching	it	to		a	computer	screen	in	open	view.)	

•	   SOS	servers	are	located	in	a	SAS	70	II	datacenters	protected	by	gated	access,	24	x	7		              	
	    x	365	on-site	staffed	security	and	technicians,	electronic	card	key	access,	and	strategically		     	
	    placed	security	cameras	both	inside	and	outside	the	building.

•	   SOS	Online	Backup	is	an	automated	offsite	backup	and	protects	data	against	hardware		 	
	    malfunction,	accidental	deletion,	virus	attacks,	theft	and	natural	disasters.	

•	   SOS’s	Ultrasafe	allows	the	user	(health	care	provider)	to	store	their	data	securely	such		          	
	    that	no	one	including	SOS	engineers	will	be	able	to	access	their	data.		

A	“business	associate”	agreement	is	not	required	with	SOS.	These	agreements	are	between	
covered	entities	where	there	IS	a	reasonable	probability	that	Protected	Health	Information	can	
be	reviewed.	

Privacy	regulations	contained	in	HIPAA	apply	to	“Electronic	Private	Health	Information”	and	SOS	
does	not	possess	this.	

As	SOS	cannot	and	does	not	examine	the	data,	no	business	associate	agreement	is	required.



For	more	information	or	questions,	email:	info@sosonlinebackup.com
or	visit	us	at	www.sosonlinebackup.com/privacy.htm

©	SOS	Online	Backup.	All	rights	reserved.	                                            SOS-HIPAA-1.2/09

More Related Content

What's hot

Healthcare data breach
Healthcare data breachHealthcare data breach
Healthcare data breachhealthsoftware
 
Web Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance CertificationWeb Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance CertificationWeb Werks Data Centers
 
eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?Mario Drobics
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policyssuser06c4a6
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentationJamesDempsey1
 
Hipaa security compliance checklist for developers & business associates
Hipaa security compliance checklist for developers & business associatesHipaa security compliance checklist for developers & business associates
Hipaa security compliance checklist for developers & business associatesShoba Krishnamurthy
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityLucy Lacy
 
Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax...
Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax...Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax...
Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax...eFax Corporate®
 
Week 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality finalWeek 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality finalLucy Lacy
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality454rss45
 
HIPAA Email Compliance & Privacy
HIPAA Email Compliance & PrivacyHIPAA Email Compliance & Privacy
HIPAA Email Compliance & Privacyappriver
 
Six pillars of security and privacy in telemedicine
Six pillars of security and privacy in telemedicineSix pillars of security and privacy in telemedicine
Six pillars of security and privacy in telemedicineirvinbalagosa
 

What's hot (19)

HIPAA Compliance Checklist for Medical Practices
HIPAA Compliance Checklist for Medical PracticesHIPAA Compliance Checklist for Medical Practices
HIPAA Compliance Checklist for Medical Practices
 
Healthcare data breach
Healthcare data breachHealthcare data breach
Healthcare data breach
 
Ingles
InglesIngles
Ingles
 
Circuit security
Circuit securityCircuit security
Circuit security
 
Web Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance CertificationWeb Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance Certification
 
eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?
 
Information security
Information securityInformation security
Information security
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policy
 
Benefits of hipaa compliance software
Benefits of hipaa compliance softwareBenefits of hipaa compliance software
Benefits of hipaa compliance software
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
Hipaa security compliance checklist for developers & business associates
Hipaa security compliance checklist for developers & business associatesHipaa security compliance checklist for developers & business associates
Hipaa security compliance checklist for developers & business associates
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentiality
 
Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax...
Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax...Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax...
Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax...
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
Week 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality finalWeek 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality final
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
HIPAA Email Compliance & Privacy
HIPAA Email Compliance & PrivacyHIPAA Email Compliance & Privacy
HIPAA Email Compliance & Privacy
 
Telemedicine: safety and security
Telemedicine: safety and securityTelemedicine: safety and security
Telemedicine: safety and security
 
Six pillars of security and privacy in telemedicine
Six pillars of security and privacy in telemedicineSix pillars of security and privacy in telemedicine
Six pillars of security and privacy in telemedicine
 

Viewers also liked

WHTWO: 25.4 REFORMING THE INDUSTRIAL WORLD
WHTWO: 25.4 REFORMING THE INDUSTRIAL WORLDWHTWO: 25.4 REFORMING THE INDUSTRIAL WORLD
WHTWO: 25.4 REFORMING THE INDUSTRIAL WORLDprofessorhood
 
KAPTAN I DERYA,ADMIRAL-IN-CHIEF
KAPTAN I DERYA,ADMIRAL-IN-CHIEFKAPTAN I DERYA,ADMIRAL-IN-CHIEF
KAPTAN I DERYA,ADMIRAL-IN-CHIEF***
 
Mobile Marketing Stats Presentation
Mobile Marketing Stats PresentationMobile Marketing Stats Presentation
Mobile Marketing Stats PresentationAaron Emerson
 
Middle East Chandrika Qatar, Third Annual Issue 2014
Middle East Chandrika Qatar, Third Annual Issue 2014Middle East Chandrika Qatar, Third Annual Issue 2014
Middle East Chandrika Qatar, Third Annual Issue 2014Nadir Abdul Salam
 
Pacific ocean[1]
Pacific ocean[1]Pacific ocean[1]
Pacific ocean[1]cpremolinos
 
Cuestionario guía de lectura documento competencias laborales
Cuestionario guía de lectura documento competencias laboralesCuestionario guía de lectura documento competencias laborales
Cuestionario guía de lectura documento competencias laboralestorresvalenciavergara
 
Mother who tortured and killed daughter jailed for 13 years
Mother who tortured and killed daughter jailed for 13 yearsMother who tortured and killed daughter jailed for 13 years
Mother who tortured and killed daughter jailed for 13 yearswolllfie
 
Logo research and idea’s
Logo research and idea’sLogo research and idea’s
Logo research and idea’sGroup_10
 
Flores y animales.pptx 1
Flores y animales.pptx 1Flores y animales.pptx 1
Flores y animales.pptx 1echazu2015
 
Tuyen sinh-truong-dh-san-khau-dien-anh-hn
Tuyen sinh-truong-dh-san-khau-dien-anh-hnTuyen sinh-truong-dh-san-khau-dien-anh-hn
Tuyen sinh-truong-dh-san-khau-dien-anh-hngiaoduc0123
 
What i want to be
What i want to beWhat i want to be
What i want to bemyaathwal
 
Miley cyrus
Miley cyrusMiley cyrus
Miley cyrusnadz1234
 
Sbk presentation jpg 2012
Sbk presentation jpg 2012Sbk presentation jpg 2012
Sbk presentation jpg 2012suryabuana
 

Viewers also liked (20)

WHTWO: 25.4 REFORMING THE INDUSTRIAL WORLD
WHTWO: 25.4 REFORMING THE INDUSTRIAL WORLDWHTWO: 25.4 REFORMING THE INDUSTRIAL WORLD
WHTWO: 25.4 REFORMING THE INDUSTRIAL WORLD
 
KAPTAN I DERYA,ADMIRAL-IN-CHIEF
KAPTAN I DERYA,ADMIRAL-IN-CHIEFKAPTAN I DERYA,ADMIRAL-IN-CHIEF
KAPTAN I DERYA,ADMIRAL-IN-CHIEF
 
Mobile Marketing Stats Presentation
Mobile Marketing Stats PresentationMobile Marketing Stats Presentation
Mobile Marketing Stats Presentation
 
Middle East Chandrika Qatar, Third Annual Issue 2014
Middle East Chandrika Qatar, Third Annual Issue 2014Middle East Chandrika Qatar, Third Annual Issue 2014
Middle East Chandrika Qatar, Third Annual Issue 2014
 
Pacific ocean[1]
Pacific ocean[1]Pacific ocean[1]
Pacific ocean[1]
 
Nic Case Study
Nic Case StudyNic Case Study
Nic Case Study
 
Emas PG & Spread
Emas PG & SpreadEmas PG & Spread
Emas PG & Spread
 
Invest for future
Invest for futureInvest for future
Invest for future
 
美美不哭了
美美不哭了美美不哭了
美美不哭了
 
Cuestionario guía de lectura documento competencias laborales
Cuestionario guía de lectura documento competencias laboralesCuestionario guía de lectura documento competencias laborales
Cuestionario guía de lectura documento competencias laborales
 
20242
2024220242
20242
 
Mother who tortured and killed daughter jailed for 13 years
Mother who tortured and killed daughter jailed for 13 yearsMother who tortured and killed daughter jailed for 13 years
Mother who tortured and killed daughter jailed for 13 years
 
Logo research and idea’s
Logo research and idea’sLogo research and idea’s
Logo research and idea’s
 
Flores y animales.pptx 1
Flores y animales.pptx 1Flores y animales.pptx 1
Flores y animales.pptx 1
 
Tuyen sinh-truong-dh-san-khau-dien-anh-hn
Tuyen sinh-truong-dh-san-khau-dien-anh-hnTuyen sinh-truong-dh-san-khau-dien-anh-hn
Tuyen sinh-truong-dh-san-khau-dien-anh-hn
 
Clases v vi
Clases v viClases v vi
Clases v vi
 
What i want to be
What i want to beWhat i want to be
What i want to be
 
Miley cyrus
Miley cyrusMiley cyrus
Miley cyrus
 
Weekly News
Weekly NewsWeekly News
Weekly News
 
Sbk presentation jpg 2012
Sbk presentation jpg 2012Sbk presentation jpg 2012
Sbk presentation jpg 2012
 

Similar to HIPAA Statement: SOS Online Backup

Medical Data Encryption 101
Medical Data Encryption 101Medical Data Encryption 101
Medical Data Encryption 101SecurityMetrics
 
Jelecos: Achieving Compliance with Axcient
Jelecos: Achieving Compliance with AxcientJelecos: Achieving Compliance with Axcient
Jelecos: Achieving Compliance with AxcientErin Olson
 
Benefits of Cloud-Based EHR ppt.pdf
Benefits of Cloud-Based EHR ppt.pdfBenefits of Cloud-Based EHR ppt.pdf
Benefits of Cloud-Based EHR ppt.pdfEduHealth1
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare ApplicationCitiusTech
 
HIPAA Compliance Healthcare Datasheet - eFax Corporate Secure Faxing
HIPAA Compliance Healthcare Datasheet - eFax Corporate Secure FaxingHIPAA Compliance Healthcare Datasheet - eFax Corporate Secure Faxing
HIPAA Compliance Healthcare Datasheet - eFax Corporate Secure FaxingeFax Corporate®
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docxPrernaThakwani
 
Service now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docxService now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docxedgar6wallace88877
 
Absolute software-for-healthcare
Absolute software-for-healthcareAbsolute software-for-healthcare
Absolute software-for-healthcareRay Treurniet
 
downtime_solution_sheet
downtime_solution_sheetdowntime_solution_sheet
downtime_solution_sheetDiego Portilla
 
Bloombase storage-protection-entrust-hsm-sb
Bloombase storage-protection-entrust-hsm-sbBloombase storage-protection-entrust-hsm-sb
Bloombase storage-protection-entrust-hsm-sbBloombase
 
Review of NIST Security Controls SC-28 SC-10
Review of NIST Security Controls SC-28 SC-10Review of NIST Security Controls SC-28 SC-10
Review of NIST Security Controls SC-28 SC-10Fuad Khan
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkErni Susanti
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case StudyEvelyn Donaldson
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case studyashu6
 
Feisal nanji himss 13 -- finalfinalfinal
Feisal nanji   himss 13 -- finalfinalfinalFeisal nanji   himss 13 -- finalfinalfinal
Feisal nanji himss 13 -- finalfinalfinalFeisal Nanji
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutionsFuji Xerox Singapore
 

Similar to HIPAA Statement: SOS Online Backup (20)

Medical Data Encryption 101
Medical Data Encryption 101Medical Data Encryption 101
Medical Data Encryption 101
 
Jelecos: Achieving Compliance with Axcient
Jelecos: Achieving Compliance with AxcientJelecos: Achieving Compliance with Axcient
Jelecos: Achieving Compliance with Axcient
 
Benefits of Cloud-Based EHR ppt.pdf
Benefits of Cloud-Based EHR ppt.pdfBenefits of Cloud-Based EHR ppt.pdf
Benefits of Cloud-Based EHR ppt.pdf
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare Application
 
HIPAA Compliance Healthcare Datasheet - eFax Corporate Secure Faxing
HIPAA Compliance Healthcare Datasheet - eFax Corporate Secure FaxingHIPAA Compliance Healthcare Datasheet - eFax Corporate Secure Faxing
HIPAA Compliance Healthcare Datasheet - eFax Corporate Secure Faxing
 
secureMFP
secureMFPsecureMFP
secureMFP
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docx
 
Service now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docxService now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docx
 
Absolute software-for-healthcare
Absolute software-for-healthcareAbsolute software-for-healthcare
Absolute software-for-healthcare
 
downtime_solution_sheet
downtime_solution_sheetdowntime_solution_sheet
downtime_solution_sheet
 
Bloombase storage-protection-entrust-hsm-sb
Bloombase storage-protection-entrust-hsm-sbBloombase storage-protection-entrust-hsm-sb
Bloombase storage-protection-entrust-hsm-sb
 
Review of NIST Security Controls SC-28 SC-10
Review of NIST Security Controls SC-28 SC-10Review of NIST Security Controls SC-28 SC-10
Review of NIST Security Controls SC-28 SC-10
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber Ark
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case Study
 
10 Things That Compromise Patient Data
10 Things That Compromise Patient Data10 Things That Compromise Patient Data
10 Things That Compromise Patient Data
 
ISM-CS5750-01.pptx
ISM-CS5750-01.pptxISM-CS5750-01.pptx
ISM-CS5750-01.pptx
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
Feisal nanji himss 13 -- finalfinalfinal
Feisal nanji   himss 13 -- finalfinalfinalFeisal nanji   himss 13 -- finalfinalfinal
Feisal nanji himss 13 -- finalfinalfinal
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions
 
Data Security
Data SecurityData Security
Data Security
 

Recently uploaded

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Recently uploaded (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

HIPAA Statement: SOS Online Backup

  • 1. SOS HIPAA STATEMENT The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was the result of efforts by the federal government to ensure healthcare data practices permitted ease for patients to move jobs, insurance and healthcare providers. As defined by 45 CFR §164.312 of HHS’ HIPAA, SOS Online Backup assist healthcare providers to be HIPAA compliant in the following ways: • SOS Online Backup, in all cases, creates, receives and transmits only encrypted data. SOS uses a three-tiered AES encryption system which encrypts data on the user’s computer, again in transit and finally when at rest in storage at SOS’s datacenters. • This data cannot be read while in transit, or even on the SOS servers, as long as the user (health care provider) does not compromise the password (for example, writing the password on a sticky note and attaching it to a computer screen in open view.) • SOS servers are located in a SAS 70 II datacenters protected by gated access, 24 x 7 x 365 on-site staffed security and technicians, electronic card key access, and strategically placed security cameras both inside and outside the building. • SOS Online Backup is an automated offsite backup and protects data against hardware malfunction, accidental deletion, virus attacks, theft and natural disasters. • SOS’s Ultrasafe allows the user (health care provider) to store their data securely such that no one including SOS engineers will be able to access their data. A “business associate” agreement is not required with SOS. These agreements are between covered entities where there IS a reasonable probability that Protected Health Information can be reviewed. Privacy regulations contained in HIPAA apply to “Electronic Private Health Information” and SOS does not possess this. As SOS cannot and does not examine the data, no business associate agreement is required. For more information or questions, email: info@sosonlinebackup.com or visit us at www.sosonlinebackup.com/privacy.htm © SOS Online Backup. All rights reserved. SOS-HIPAA-1.2/09