Why SMS is not HIPAA compliant

qliqSoft
qliqSoftqliqSoft
WHY SMS IS NOT HIPAA COMPLIANT *
                                                                                 *or, more accurately, “Why SMS does not support HIPAA compliance




                                                                                                              This diagram has been simplified to illustrate the movement of text message data through a typical GSM (Global System
    TYPICAL DATA FLOW OF A TEXT MESSAGE OVER A GSM NETWORK                                                    for Mobile Communications) network. In particular, the message acknowledgement process as well as routing requests
                                                                                                              through the Home Location Register (HLR) and the Visitor Location Register (VLR) have been omitted.




1   Sender submits text message, which contains the short
    message (SM) text, destination address, and address of
    the SMS Center (SMSC); handset sends the message
    over the air (OTA).
                                                                           4      The SMSC stores a copy of the message where it is retained for a
                                                                                  period of time known as the “validity period” The SMSC simultane-
                                                                                                                                .
                                                                                  ously attempts to deliver a copy of the message to the recipient. In
                                                                                  order to locate the recipient, the SMSC sends a routing request to the


                                                                                                                                                                            6
                                                                                  Home Location Register (HLR). The HLR locates the recipient and sends                            The MSC routes the message
                                                                                  correct routing information back to the SMSC.

                  2
                                                                                                                                                                                   to the correct base station.
                         Signal received by tower and processed by
                         the base station and then sent to the


                                                                                                                 5
                         Mobile Switching Center (MSC).
                                                                                                                        The SMSC then forwards the message to

                                                                                                                                                                                           7
                                                                                                                        the recipient’s servicing MSC. The MSC will                                The message is processed by the

                                               3      MSC routes the message to the
                                                      SMSC identified in the message.
                                                                                                                        request the recipient’s current location
                                                                                                                        from the Visitor Location Register.
                                                                                                                                                                                                   base station and transmitted to
                                                                                                                                                                                                   the recipient’s handset.




                                                                                                    SMS
                                                                                                   CENTER
                                                                 MOBILE                                                                  MOBILE
                                          BASE                  SWITCHING                                                               SWITCHING                          BASE
                                         STATION                                                                                                                          STATION
                                                                 CENTER                                                                  CENTER




    SECURITY VULNERABILITIES


A   PHYSICAL SECURITY                                                                                    C    INTERCEPTION
    The physical security of the phone or other mobile device itself represents the greatest                  As the SMS message is sent from the base station to the MSC and then on to the SMSC, it passes
G   vulnerability for information being inappropriately accessed. In a default configuration, devices    E    over the carrier’s network unencrypted, making it susceptible to interception.
    do not require a user to authenticate with security credentials to access device applications and
    data. Additionally, information is stored in clear text, or unencrypted, in the native messaging
    application where it can be readily accessed, manipulated and/or removed. Finally, if a device is    D    STORE & FORWARD
    lost or stolen, there is no way to remotely lock or wipe data to prevent unauthorized access.             When the SMS message arrives at the SMSC, a copy is stored in clear text on the carrier’s server
                                                                                                              where it is held for the “validity period”, pending successful delivery of the message. While the
                                                                                                              GSM implementation of SMS allows the sender’s SMSC to deliver the message directly to the
    EAVESDROPPING                                                                                             recipient’s MSC, CDMA (which includes both Sprint and Verizon networks in the US) requires a copy
B                                                                                                             of the message to be sent to the recipient’s SMSC where a copy of the message is also stored and
    During OTA transmission, the signal - including voice and text data - is optionally encrypted
    (meaning it is up to the specific carrier) using a weak and broken stream cipher (A5/1 or A5/2).          forwarded. This means that for messages sent within CDMA or across networks (GSM <-> CDMA) at
F
    Both A5/1 and the encryption algorithm used to secure GPRS (General Packet Radio Service)                 least two copies of the message are retained in clear text, accessible by carrier personnel with
    have been broken within the last couple of years, demonstrating the susceptibility of these               SMSC access. Finally, even more copies of the message may be stored if one or more SMS gateways
    transmissions to eavesdropping.                                                                           are used to facilitate message delivery across carriers using incompatible technologies.


                                                                                                                                                                                                   © 2012 qliqSoft, Inc. All rights reserved.
WHY SMS IS NOT HIPAA COMPLIANT *
                                                                          *or, more accurately, “Why SMS does not support HIPAA compliance




     HIPAA CONSIDERATIONS


According to the HIPAA Security Rule, Covered Entities and Business Associates acting on               PHYSICAL SAFEGUARD CHALLENGES
their behalf are required to implement a number of technical and non-technical safeguards
if they transmit or otherwise maintain electronic protected health information (ePHI). As a
                                                                                                         controls without defeating the core purpose of consumer wireless communications
result, if a member of a Covered Entity or one of its Business Associates uses SMS-based text
messaging to transmit PHI, then the Covered Entity or Business Associate is required to
comply with the safeguards outlined in the Security Rule.
                                                                                                         compliance, however infrastructure beyond the domain of the core facility, third-party
                                                                                                         providers and non-regulated facilities in foreign countries cannot be reliably managed.
Based on the security vulnerabilities described above, Covered Entities and Business
Associates confront the following compliance challenges when sending PHI via SMS:
                                                                                                       TECHNICAL SAFEGUARD CHALLENGES

ADMINISTRATIVE SAFEGUARD CHALLENGES
                                                                                                         not be implemented across heterogeneous networks and a disparate subscriber base.
                                                                    applied across all of
 the organizations involved in the transmission and delivery of SMS messages.



 ePHI with regard to access and audit controls, or personnel management. In SMS systems,
 there is no reliable means of identification of ePHI, and therefore no reliable means of
 segregation of the data for the purpose of focusing security controls. This condition also
 makes fulfillment of the required terms for Business Associate Agreements not feasible.




                                                                                                                                                                         © 2012 qliqSoft, Inc. All rights reserved.
1 of 2

Recommended

Mobile communication fundamental by
Mobile communication fundamentalMobile communication fundamental
Mobile communication fundamentalTHANDAIAH PRABU
13.3K views59 slides
Gsm architecture and interfaces Telebeans by
Gsm architecture and interfaces TelebeansGsm architecture and interfaces Telebeans
Gsm architecture and interfaces TelebeansTelebeansolutions
2.6K views25 slides
Gsm system and radio frequency by
Gsm system and radio frequency Gsm system and radio frequency
Gsm system and radio frequency Maulik Patel
4.1K views18 slides
Ch6 by
Ch6Ch6
Ch6Ronak Patel
13.6K views44 slides
cellular concepts in wireless communication by
cellular concepts in wireless communicationcellular concepts in wireless communication
cellular concepts in wireless communicationasadkhan1327
49.4K views79 slides
Gsm channel calculations by
Gsm channel calculationsGsm channel calculations
Gsm channel calculationsAlthaf Hussain
26.3K views79 slides

More Related Content

What's hot

IPv6 by
IPv6IPv6
IPv6Abdelkhalik Mosa
1.5K views23 slides
Cellular communication by
Cellular communicationCellular communication
Cellular communicationshalet kochumuttath Shaji
547 views49 slides
Cellular Telephone Systems by
Cellular Telephone SystemsCellular Telephone Systems
Cellular Telephone SystemsShantanu Krishna
20.4K views18 slides
Adjacent channel interference in wireless . by
Adjacent channel interference in wireless .Adjacent channel interference in wireless .
Adjacent channel interference in wireless .Mahmood Showrav
5.1K views18 slides
Sistema de señalizacion. ss7 by
Sistema de señalizacion. ss7Sistema de señalizacion. ss7
Sistema de señalizacion. ss7NakariCastellanos
8K views11 slides
-introduction-to-cellular-mobile-communications by
-introduction-to-cellular-mobile-communications-introduction-to-cellular-mobile-communications
-introduction-to-cellular-mobile-communicationsjhcid
2.6K views63 slides

What's hot(20)

Adjacent channel interference in wireless . by Mahmood Showrav
Adjacent channel interference in wireless .Adjacent channel interference in wireless .
Adjacent channel interference in wireless .
Mahmood Showrav5.1K views
-introduction-to-cellular-mobile-communications by jhcid
-introduction-to-cellular-mobile-communications-introduction-to-cellular-mobile-communications
-introduction-to-cellular-mobile-communications
jhcid2.6K views
LTE paging.ppt by mravi423
LTE paging.pptLTE paging.ppt
LTE paging.ppt
mravi42310.5K views
Jerarquía de Red telefónica y marcación by Arturrow
Jerarquía de Red telefónica y marcaciónJerarquía de Red telefónica y marcación
Jerarquía de Red telefónica y marcación
Arturrow5.3K views
Cellular network by Mr SMAK
Cellular networkCellular network
Cellular network
Mr SMAK38.7K views
fundamenatals of cellular enginering by Maulik Patel
fundamenatals of cellular engineringfundamenatals of cellular enginering
fundamenatals of cellular enginering
Maulik Patel3.2K views
CELLULAR COMMUNICATION SYSTEM by Suryani Ilias
CELLULAR COMMUNICATION SYSTEMCELLULAR COMMUNICATION SYSTEM
CELLULAR COMMUNICATION SYSTEM
Suryani Ilias48.8K views
Umts system architecture by Midhun S
Umts system architectureUmts system architecture
Umts system architecture
Midhun S8.9K views
Wi-max Technology PPT by Vinay Krishna
Wi-max Technology PPTWi-max Technology PPT
Wi-max Technology PPT
Vinay Krishna31.4K views

Similar to Why SMS is not HIPAA compliant

Call Setup by
Call SetupCall Setup
Call SetupSokunth Che
1.1K views6 slides
Gsm overview 10 by
Gsm overview 10Gsm overview 10
Gsm overview 10Percyjm
706 views6 slides
SMS by
SMSSMS
SMSSokunth Che
682 views6 slides
gsm_call_routing.pptx by
gsm_call_routing.pptxgsm_call_routing.pptx
gsm_call_routing.pptxMilanap1
3 views21 slides
Moc mtc by
Moc mtcMoc mtc
Moc mtcRazzaqe
14.5K views3 slides
five by
fivefive
fiveم.وائل الزعبي
437 views48 slides

Similar to Why SMS is not HIPAA compliant(19)

Gsm overview 10 by Percyjm
Gsm overview 10Gsm overview 10
Gsm overview 10
Percyjm706 views
gsm_call_routing.pptx by Milanap1
gsm_call_routing.pptxgsm_call_routing.pptx
gsm_call_routing.pptx
Milanap13 views
Moc mtc by Razzaqe
Moc mtcMoc mtc
Moc mtc
Razzaqe14.5K views
Location Updating by Sokunth Che
Location UpdatingLocation Updating
Location Updating
Sokunth Che858 views
System Introduction by Sokunth Che
System IntroductionSystem Introduction
System Introduction
Sokunth Che278 views
Switching System by Sokunth Che
Switching SystemSwitching System
Switching System
Sokunth Che629 views
Definition msc by eieiswe
Definition mscDefinition msc
Definition msc
eieiswe512 views
Gsm originating call_flow by Ramijazzar
Gsm originating call_flowGsm originating call_flow
Gsm originating call_flow
Ramijazzar1.1K views
Gsm Originating Call Flow by Deepak Sharma
Gsm Originating Call FlowGsm Originating Call Flow
Gsm Originating Call Flow
Deepak Sharma8.7K views
Handover call_flow in GSM by virender123243
 Handover call_flow in GSM Handover call_flow in GSM
Handover call_flow in GSM
virender1232431.6K views
Calling Procedure and Channel Mapping in GSM Network by Noor Nabi
Calling Procedure and Channel Mapping in GSM Network Calling Procedure and Channel Mapping in GSM Network
Calling Procedure and Channel Mapping in GSM Network
Noor Nabi136 views
Cellular network by shreb
Cellular networkCellular network
Cellular network
shreb16.7K views

More from qliqSoft

Secure Texting Best Practices: Connect with External Organizations by
Secure Texting Best Practices: Connect with External OrganizationsSecure Texting Best Practices: Connect with External Organizations
Secure Texting Best Practices: Connect with External OrganizationsqliqSoft
490 views12 slides
Secure Texting Best Practices: Supercharge Your Implementation Plan by
Secure Texting Best Practices: Supercharge Your Implementation PlanSecure Texting Best Practices: Supercharge Your Implementation Plan
Secure Texting Best Practices: Supercharge Your Implementation PlanqliqSoft
522 views31 slides
Secure Texting Best Practices: Communicate Your Policies by
Secure Texting Best Practices: Communicate Your PoliciesSecure Texting Best Practices: Communicate Your Policies
Secure Texting Best Practices: Communicate Your PoliciesqliqSoft
489 views16 slides
Secure Texting Best Practices: Get Your Organization On Board by
Secure Texting Best Practices: Get Your Organization On BoardSecure Texting Best Practices: Get Your Organization On Board
Secure Texting Best Practices: Get Your Organization On BoardqliqSoft
523 views21 slides
Secure Texting Best Practices: Identify Your Goals by
Secure Texting Best Practices: Identify Your GoalsSecure Texting Best Practices: Identify Your Goals
Secure Texting Best Practices: Identify Your GoalsqliqSoft
674 views30 slides
HIPAA compliance statement by
HIPAA compliance statementHIPAA compliance statement
HIPAA compliance statementqliqSoft
446 views2 slides

More from qliqSoft(6)

Secure Texting Best Practices: Connect with External Organizations by qliqSoft
Secure Texting Best Practices: Connect with External OrganizationsSecure Texting Best Practices: Connect with External Organizations
Secure Texting Best Practices: Connect with External Organizations
qliqSoft490 views
Secure Texting Best Practices: Supercharge Your Implementation Plan by qliqSoft
Secure Texting Best Practices: Supercharge Your Implementation PlanSecure Texting Best Practices: Supercharge Your Implementation Plan
Secure Texting Best Practices: Supercharge Your Implementation Plan
qliqSoft522 views
Secure Texting Best Practices: Communicate Your Policies by qliqSoft
Secure Texting Best Practices: Communicate Your PoliciesSecure Texting Best Practices: Communicate Your Policies
Secure Texting Best Practices: Communicate Your Policies
qliqSoft489 views
Secure Texting Best Practices: Get Your Organization On Board by qliqSoft
Secure Texting Best Practices: Get Your Organization On BoardSecure Texting Best Practices: Get Your Organization On Board
Secure Texting Best Practices: Get Your Organization On Board
qliqSoft523 views
Secure Texting Best Practices: Identify Your Goals by qliqSoft
Secure Texting Best Practices: Identify Your GoalsSecure Texting Best Practices: Identify Your Goals
Secure Texting Best Practices: Identify Your Goals
qliqSoft674 views
HIPAA compliance statement by qliqSoft
HIPAA compliance statementHIPAA compliance statement
HIPAA compliance statement
qliqSoft446 views

Recently uploaded

TQM ASSIGMENT 3.pdf by
TQM ASSIGMENT 3.pdfTQM ASSIGMENT 3.pdf
TQM ASSIGMENT 3.pdfد حاتم البيطار
8 views11 slides
Top PCD Pharma Franchise Companies in India | Saphnix Lifesciences by
Top PCD Pharma Franchise Companies in India | Saphnix LifesciencesTop PCD Pharma Franchise Companies in India | Saphnix Lifesciences
Top PCD Pharma Franchise Companies in India | Saphnix LifesciencesSaphnix Lifesciences
25 views11 slides
JANUARY 2013-Classical Prescribing.pdf by
JANUARY 2013-Classical Prescribing.pdfJANUARY 2013-Classical Prescribing.pdf
JANUARY 2013-Classical Prescribing.pdfAllen College of Homoeopathy USA
25 views12 slides
Pregnancy tips.pptx by
Pregnancy tips.pptxPregnancy tips.pptx
Pregnancy tips.pptxreachout7
40 views10 slides
Basic Life support (BLS) workshop presentation. by
Basic Life support (BLS) workshop presentation.Basic Life support (BLS) workshop presentation.
Basic Life support (BLS) workshop presentation.Dr Sanket Nandekar
33 views39 slides
Top 10 Pharma Companies in Mumbai | Medibyte by
Top 10 Pharma Companies in Mumbai | MedibyteTop 10 Pharma Companies in Mumbai | Medibyte
Top 10 Pharma Companies in Mumbai | MedibyteMedibyte Pharma
17 views1 slide

Recently uploaded(20)

Top PCD Pharma Franchise Companies in India | Saphnix Lifesciences by Saphnix Lifesciences
Top PCD Pharma Franchise Companies in India | Saphnix LifesciencesTop PCD Pharma Franchise Companies in India | Saphnix Lifesciences
Top PCD Pharma Franchise Companies in India | Saphnix Lifesciences
Pregnancy tips.pptx by reachout7
Pregnancy tips.pptxPregnancy tips.pptx
Pregnancy tips.pptx
reachout740 views
Basic Life support (BLS) workshop presentation. by Dr Sanket Nandekar
Basic Life support (BLS) workshop presentation.Basic Life support (BLS) workshop presentation.
Basic Life support (BLS) workshop presentation.
Top 10 Pharma Companies in Mumbai | Medibyte by Medibyte Pharma
Top 10 Pharma Companies in Mumbai | MedibyteTop 10 Pharma Companies in Mumbai | Medibyte
Top 10 Pharma Companies in Mumbai | Medibyte
Medibyte Pharma17 views
eTEP -RS Dr.TVR.pptx by Varunraju9
eTEP -RS Dr.TVR.pptxeTEP -RS Dr.TVR.pptx
eTEP -RS Dr.TVR.pptx
Varunraju9131 views
The AI apocalypse has been canceled by Tina Purnat
The AI apocalypse has been canceledThe AI apocalypse has been canceled
The AI apocalypse has been canceled
Tina Purnat134 views
Taking Action to Improve the Patient Journey With Transthyretin Amyloidosis (... by PeerVoice
Taking Action to Improve the Patient Journey With Transthyretin Amyloidosis (...Taking Action to Improve the Patient Journey With Transthyretin Amyloidosis (...
Taking Action to Improve the Patient Journey With Transthyretin Amyloidosis (...
PeerVoice8 views
Blockchain based automatic diagnosis of the 12-lead ECG using a deep neural n... by RajaulKarim20
Blockchain based automatic diagnosis of the 12-lead ECG using a deep neural n...Blockchain based automatic diagnosis of the 12-lead ECG using a deep neural n...
Blockchain based automatic diagnosis of the 12-lead ECG using a deep neural n...
RajaulKarim2099 views
AntiAnxiety Drugs .pptx by Dr Dhanik Mk
AntiAnxiety Drugs .pptxAntiAnxiety Drugs .pptx
AntiAnxiety Drugs .pptx
Dr Dhanik Mk11 views
VarSeq 2.5.0: VSClinical AMP Workflow from the User Perspective by Golden Helix
VarSeq 2.5.0: VSClinical AMP Workflow from the User PerspectiveVarSeq 2.5.0: VSClinical AMP Workflow from the User Perspective
VarSeq 2.5.0: VSClinical AMP Workflow from the User Perspective
Golden Helix67 views
The relative risk of cancer from smoking and vaping nicotine by yfzsc5g7nm
The relative risk of cancer from smoking and vaping nicotine The relative risk of cancer from smoking and vaping nicotine
The relative risk of cancer from smoking and vaping nicotine
yfzsc5g7nm176 views
Referral-system_April-2023.pdf by manali9054
Referral-system_April-2023.pdfReferral-system_April-2023.pdf
Referral-system_April-2023.pdf
manali905437 views

Why SMS is not HIPAA compliant

  • 1. WHY SMS IS NOT HIPAA COMPLIANT * *or, more accurately, “Why SMS does not support HIPAA compliance This diagram has been simplified to illustrate the movement of text message data through a typical GSM (Global System TYPICAL DATA FLOW OF A TEXT MESSAGE OVER A GSM NETWORK for Mobile Communications) network. In particular, the message acknowledgement process as well as routing requests through the Home Location Register (HLR) and the Visitor Location Register (VLR) have been omitted. 1 Sender submits text message, which contains the short message (SM) text, destination address, and address of the SMS Center (SMSC); handset sends the message over the air (OTA). 4 The SMSC stores a copy of the message where it is retained for a period of time known as the “validity period” The SMSC simultane- . ously attempts to deliver a copy of the message to the recipient. In order to locate the recipient, the SMSC sends a routing request to the 6 Home Location Register (HLR). The HLR locates the recipient and sends The MSC routes the message correct routing information back to the SMSC. 2 to the correct base station. Signal received by tower and processed by the base station and then sent to the 5 Mobile Switching Center (MSC). The SMSC then forwards the message to 7 the recipient’s servicing MSC. The MSC will The message is processed by the 3 MSC routes the message to the SMSC identified in the message. request the recipient’s current location from the Visitor Location Register. base station and transmitted to the recipient’s handset. SMS CENTER MOBILE MOBILE BASE SWITCHING SWITCHING BASE STATION STATION CENTER CENTER SECURITY VULNERABILITIES A PHYSICAL SECURITY C INTERCEPTION The physical security of the phone or other mobile device itself represents the greatest As the SMS message is sent from the base station to the MSC and then on to the SMSC, it passes G vulnerability for information being inappropriately accessed. In a default configuration, devices E over the carrier’s network unencrypted, making it susceptible to interception. do not require a user to authenticate with security credentials to access device applications and data. Additionally, information is stored in clear text, or unencrypted, in the native messaging application where it can be readily accessed, manipulated and/or removed. Finally, if a device is D STORE & FORWARD lost or stolen, there is no way to remotely lock or wipe data to prevent unauthorized access. When the SMS message arrives at the SMSC, a copy is stored in clear text on the carrier’s server where it is held for the “validity period”, pending successful delivery of the message. While the GSM implementation of SMS allows the sender’s SMSC to deliver the message directly to the EAVESDROPPING recipient’s MSC, CDMA (which includes both Sprint and Verizon networks in the US) requires a copy B of the message to be sent to the recipient’s SMSC where a copy of the message is also stored and During OTA transmission, the signal - including voice and text data - is optionally encrypted (meaning it is up to the specific carrier) using a weak and broken stream cipher (A5/1 or A5/2). forwarded. This means that for messages sent within CDMA or across networks (GSM <-> CDMA) at F Both A5/1 and the encryption algorithm used to secure GPRS (General Packet Radio Service) least two copies of the message are retained in clear text, accessible by carrier personnel with have been broken within the last couple of years, demonstrating the susceptibility of these SMSC access. Finally, even more copies of the message may be stored if one or more SMS gateways transmissions to eavesdropping. are used to facilitate message delivery across carriers using incompatible technologies. © 2012 qliqSoft, Inc. All rights reserved.
  • 2. WHY SMS IS NOT HIPAA COMPLIANT * *or, more accurately, “Why SMS does not support HIPAA compliance HIPAA CONSIDERATIONS According to the HIPAA Security Rule, Covered Entities and Business Associates acting on PHYSICAL SAFEGUARD CHALLENGES their behalf are required to implement a number of technical and non-technical safeguards if they transmit or otherwise maintain electronic protected health information (ePHI). As a controls without defeating the core purpose of consumer wireless communications result, if a member of a Covered Entity or one of its Business Associates uses SMS-based text messaging to transmit PHI, then the Covered Entity or Business Associate is required to comply with the safeguards outlined in the Security Rule. compliance, however infrastructure beyond the domain of the core facility, third-party providers and non-regulated facilities in foreign countries cannot be reliably managed. Based on the security vulnerabilities described above, Covered Entities and Business Associates confront the following compliance challenges when sending PHI via SMS: TECHNICAL SAFEGUARD CHALLENGES ADMINISTRATIVE SAFEGUARD CHALLENGES not be implemented across heterogeneous networks and a disparate subscriber base. applied across all of the organizations involved in the transmission and delivery of SMS messages. ePHI with regard to access and audit controls, or personnel management. In SMS systems, there is no reliable means of identification of ePHI, and therefore no reliable means of segregation of the data for the purpose of focusing security controls. This condition also makes fulfillment of the required terms for Business Associate Agreements not feasible. © 2012 qliqSoft, Inc. All rights reserved.