SlideShare a Scribd company logo
1 of 6
Download to read offline
HIPAA Compliance
                                                in the Cloud &
                                             in the Data Center
                                                                     Hosted by:
                                                             Yan Ness, CEO, Online Tech
                                                           With Special Guest Speaker:
                                                         Joe Dylewski, President, ATMP Group



                 Colocation                         Dedicated Servers                 Private Clouds

Copyright © 2011 Online Tech. All rights reserved                www.onlinetech.com                    734.213.2020
Speakers

                                         Joe Dylewski, President, ATMP Group
                                         Joseph Dylewski is a twenty-three year Information Technology Professional
                                         veteran, with eight years spent exclusively in the Healthcare Industry. In addition
                                         to holding positions as a Project Manager and Director of Information
                                         Technology Joseph has also served as a Healthcare IT Services Practices
                                         Director and Account Manager with a proven track-record of successfully
                                         delivering end-to-end IT application and infrastructure project services. Joseph
                                         also currently serves as an Assistant Professor at Madonna University.

                                         Yan Ness, CEO, Online Tech
                                         Yan has more than 20 years of experience launching and managing high tech
                                         companies, from startup to scale. In 2003, Yan led a group of investors to
                                         acquire Online Tech and has since served as the CEO, growing the company
                                         from 600 to more than 40,000 square feet of capacity. Prior to Online Tech, Yan
                                         was co-founder of CompanyCrafters and WorkWell Health and Safety Systems,
                                         which was acquired by Liberty Mutual. Yan serves on numerous boards,
                                         including the board of directors for the Small Business Association of Michigan.


                 Colocation                         Dedicated Servers                Private Clouds

Copyright © 2011 Online Tech. All rights reserved               www.onlinetech.com                           734.213.2020
Who has HIPAA Responsibility?




                 Colocation                         Dedicated Servers                Private Clouds

Copyright © 2011 Online Tech. All rights reserved               www.onlinetech.com                    734.213.2020
Helpful Links


         http://www.hhs.gov/ocr/privacy/
         http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/businessassoci
         ates.html
         http://www.hhs.gov/ocr/privacy/hipaa/administrative/enforcementrule/hitechenforce
         mentifr.html
         http://www.hipaasurvivalguide.com/
         http://www.hipaasecurityandprivacy.com/
         http://www.onlinetech.com/secure-hosting/hipaa-compliant-hosting
         http://www.onlinetech.com/secure-hosting/hipaa-compliant-hosting/hipaa-compliant-
         hosting-case-studies




                 Colocation                         Dedicated Servers                Private Clouds

Copyright © 2011 Online Tech. All rights reserved               www.onlinetech.com                    734.213.2020
Contact Info


        Joe Dylewski
        jdylewski@atmpgroup.com
        http://www.atmpgroup.com
        Office: 734.713.7471

        Online Tech
        contactus@onlinetech.com
        http://www.onlinetech.com
        Main: 734-213-2020




                 Colocation                         Dedicated Servers                Private Clouds

Copyright © 2011 Online Tech. All rights reserved               www.onlinetech.com                    734.213.2020
The webinar series continues next week with guest speaker, Adam Goslin.

       Tuesday, July 26th @ 2pm ET - Network and Application Security Explained
       This webinar will explain the need for network and application security (firewalls, intrusion prevention systems,
       virus scanning, penetration testing, etc.), review advantages and disadvantages of several options for assessing
       present security stance, cover frequently asked security questions, provide recommendations for a solid and
       sensible approach to securing your environment and explore typical network and application layer security flaws.

       Tuesday, August 2nd @ 2pm ET - New Solutions for Security and Compliance in the
       Cloud
       This webinar will review data security challenges in cloud environments as well as introduce new solutions for
       meeting security and compliance in virtualized and cloud infrastructure. Hosted by Online Tech with special guest
       speaker Brian Foley


                                           Register at www.onlinetech.com/webinars

                 Colocation                         Dedicated Servers                Private Clouds

Copyright © 2011 Online Tech. All rights reserved               www.onlinetech.com                         734.213.2020

More Related Content

What's hot

Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Hamisi Kibonde
 
Perimeter Security Case Study
Perimeter Security Case StudyPerimeter Security Case Study
Perimeter Security Case Study
nmullen
 

What's hot (19)

Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 Praesentation
 
Database Security: What Gets Overlooked?
Database Security: What Gets Overlooked?Database Security: What Gets Overlooked?
Database Security: What Gets Overlooked?
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of Bloatware
 
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the Society
 
Inside Cybero
Inside CyberoInside Cybero
Inside Cybero
 
Cloud email demystified
Cloud email demystifiedCloud email demystified
Cloud email demystified
 
The New IT – Empowering Your Next Generation Workforce
The New IT – Empowering Your Next Generation WorkforceThe New IT – Empowering Your Next Generation Workforce
The New IT – Empowering Your Next Generation Workforce
 
Aniketos trust bus_sept_2012
Aniketos trust bus_sept_2012Aniketos trust bus_sept_2012
Aniketos trust bus_sept_2012
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
 
Challenges2013
Challenges2013Challenges2013
Challenges2013
 
Cloud Security by CK
Cloud Security by CKCloud Security by CK
Cloud Security by CK
 
Information Technology Supporting the Development of International Standards
Information Technology Supporting the Development of International StandardsInformation Technology Supporting the Development of International Standards
Information Technology Supporting the Development of International Standards
 
Six Irrefutable Laws of Information Security
Six Irrefutable Laws of Information SecuritySix Irrefutable Laws of Information Security
Six Irrefutable Laws of Information Security
 
Regulatory Compliance Financial Institution
Regulatory Compliance Financial InstitutionRegulatory Compliance Financial Institution
Regulatory Compliance Financial Institution
 
Patch management
Patch managementPatch management
Patch management
 
News letter oct 11
News letter oct 11News letter oct 11
News letter oct 11
 
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderState of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry Insider
 
Perimeter Security Case Study
Perimeter Security Case StudyPerimeter Security Case Study
Perimeter Security Case Study
 

Similar to HIPAA Compliance in the Cloud

Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
HyTrust
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochure
tmcleland
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
HyTrust
 
Cloud Computing Webinar - John Reza
Cloud Computing Webinar - John RezaCloud Computing Webinar - John Reza
Cloud Computing Webinar - John Reza
John Reza, MBA
 
SharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
SharePoint Saturday Belgium 2014 - A practical guide for navigating the cloudsSharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
SharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
BIWUG
 
How to utilize cloud in your corporate it strategy
How to utilize cloud in your corporate it strategyHow to utilize cloud in your corporate it strategy
How to utilize cloud in your corporate it strategy
Redpath Consulting Group
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012
Infoblox
 
HELLMANN FINANCE, INC. Hellmann Finance, Inc. (HFI) i.docx
HELLMANN FINANCE, INC.  Hellmann Finance, Inc. (HFI) i.docxHELLMANN FINANCE, INC.  Hellmann Finance, Inc. (HFI) i.docx
HELLMANN FINANCE, INC. Hellmann Finance, Inc. (HFI) i.docx
pooleavelina
 
How to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT StrategyHow to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT Strategy
VISIHOSTING
 

Similar to HIPAA Compliance in the Cloud (20)

Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochure
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Cloud Computing Webinar - John Reza
Cloud Computing Webinar - John RezaCloud Computing Webinar - John Reza
Cloud Computing Webinar - John Reza
 
How to neutralize vulnerabilities in a mixed cloud- on premise environment
How to neutralize vulnerabilities in a mixed cloud- on premise environmentHow to neutralize vulnerabilities in a mixed cloud- on premise environment
How to neutralize vulnerabilities in a mixed cloud- on premise environment
 
11 IT Management Predictions for 2011
11 IT Management Predictions for 201111 IT Management Predictions for 2011
11 IT Management Predictions for 2011
 
SharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
SharePoint Saturday Belgium 2014 - A practical guide for navigating the cloudsSharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
SharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
 
How to utilize cloud in your corporate IT strategy
How to utilize cloud in your corporate IT strategy How to utilize cloud in your corporate IT strategy
How to utilize cloud in your corporate IT strategy
 
The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
How to utilize cloud in your corporate it strategy
How to utilize cloud in your corporate it strategyHow to utilize cloud in your corporate it strategy
How to utilize cloud in your corporate it strategy
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
 
Applied mobile chaos theory
Applied mobile chaos theoryApplied mobile chaos theory
Applied mobile chaos theory
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
HELLMANN FINANCE, INC. Hellmann Finance, Inc. (HFI) i.docx
HELLMANN FINANCE, INC.  Hellmann Finance, Inc. (HFI) i.docxHELLMANN FINANCE, INC.  Hellmann Finance, Inc. (HFI) i.docx
HELLMANN FINANCE, INC. Hellmann Finance, Inc. (HFI) i.docx
 
How to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT StrategyHow to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT Strategy
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks
 

More from Online Tech

Legal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAsLegal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAs
Online Tech
 
Cloud Computing Disaster Recovery Framework
Cloud Computing Disaster Recovery FrameworkCloud Computing Disaster Recovery Framework
Cloud Computing Disaster Recovery Framework
Online Tech
 

More from Online Tech (6)

New Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the CloudNew Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the Cloud
 
Legal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAsLegal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAs
 
Cloud Computing Disaster Recovery Framework
Cloud Computing Disaster Recovery FrameworkCloud Computing Disaster Recovery Framework
Cloud Computing Disaster Recovery Framework
 
Disaster Recovery in the Cloud -- A Failover Testing Case Study
Disaster Recovery in the Cloud -- A Failover Testing Case StudyDisaster Recovery in the Cloud -- A Failover Testing Case Study
Disaster Recovery in the Cloud -- A Failover Testing Case Study
 
Navigating the World of Cloud Computing
Navigating the World of Cloud ComputingNavigating the World of Cloud Computing
Navigating the World of Cloud Computing
 
Colocation Basics for Small to Medium Sized Businesses
Colocation Basics for Small to Medium Sized BusinessesColocation Basics for Small to Medium Sized Businesses
Colocation Basics for Small to Medium Sized Businesses
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

HIPAA Compliance in the Cloud

  • 1. HIPAA Compliance in the Cloud & in the Data Center Hosted by: Yan Ness, CEO, Online Tech With Special Guest Speaker: Joe Dylewski, President, ATMP Group Colocation Dedicated Servers Private Clouds Copyright © 2011 Online Tech. All rights reserved www.onlinetech.com 734.213.2020
  • 2. Speakers Joe Dylewski, President, ATMP Group Joseph Dylewski is a twenty-three year Information Technology Professional veteran, with eight years spent exclusively in the Healthcare Industry. In addition to holding positions as a Project Manager and Director of Information Technology Joseph has also served as a Healthcare IT Services Practices Director and Account Manager with a proven track-record of successfully delivering end-to-end IT application and infrastructure project services. Joseph also currently serves as an Assistant Professor at Madonna University. Yan Ness, CEO, Online Tech Yan has more than 20 years of experience launching and managing high tech companies, from startup to scale. In 2003, Yan led a group of investors to acquire Online Tech and has since served as the CEO, growing the company from 600 to more than 40,000 square feet of capacity. Prior to Online Tech, Yan was co-founder of CompanyCrafters and WorkWell Health and Safety Systems, which was acquired by Liberty Mutual. Yan serves on numerous boards, including the board of directors for the Small Business Association of Michigan. Colocation Dedicated Servers Private Clouds Copyright © 2011 Online Tech. All rights reserved www.onlinetech.com 734.213.2020
  • 3. Who has HIPAA Responsibility? Colocation Dedicated Servers Private Clouds Copyright © 2011 Online Tech. All rights reserved www.onlinetech.com 734.213.2020
  • 4. Helpful Links http://www.hhs.gov/ocr/privacy/ http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/businessassoci ates.html http://www.hhs.gov/ocr/privacy/hipaa/administrative/enforcementrule/hitechenforce mentifr.html http://www.hipaasurvivalguide.com/ http://www.hipaasecurityandprivacy.com/ http://www.onlinetech.com/secure-hosting/hipaa-compliant-hosting http://www.onlinetech.com/secure-hosting/hipaa-compliant-hosting/hipaa-compliant- hosting-case-studies Colocation Dedicated Servers Private Clouds Copyright © 2011 Online Tech. All rights reserved www.onlinetech.com 734.213.2020
  • 5. Contact Info Joe Dylewski jdylewski@atmpgroup.com http://www.atmpgroup.com Office: 734.713.7471 Online Tech contactus@onlinetech.com http://www.onlinetech.com Main: 734-213-2020 Colocation Dedicated Servers Private Clouds Copyright © 2011 Online Tech. All rights reserved www.onlinetech.com 734.213.2020
  • 6. The webinar series continues next week with guest speaker, Adam Goslin. Tuesday, July 26th @ 2pm ET - Network and Application Security Explained This webinar will explain the need for network and application security (firewalls, intrusion prevention systems, virus scanning, penetration testing, etc.), review advantages and disadvantages of several options for assessing present security stance, cover frequently asked security questions, provide recommendations for a solid and sensible approach to securing your environment and explore typical network and application layer security flaws. Tuesday, August 2nd @ 2pm ET - New Solutions for Security and Compliance in the Cloud This webinar will review data security challenges in cloud environments as well as introduce new solutions for meeting security and compliance in virtualized and cloud infrastructure. Hosted by Online Tech with special guest speaker Brian Foley Register at www.onlinetech.com/webinars Colocation Dedicated Servers Private Clouds Copyright © 2011 Online Tech. All rights reserved www.onlinetech.com 734.213.2020