SlideShare a Scribd company logo
Tips for Securing
ePHI in the Cloud
When it comes to entrusting your electronic protected
health information (ePHI) to a third-party cloud services
provider, security is arguably the biggest concern.
A lot of factors must be considered when looking for
qualified providers you can work with and who want to
work with you. Here are some considerations.
covered entities are required
to have three plans...
Under the HIPAA Security Rule,
1
...for recovering access to ePHI
should the organization experience an emergency or a disruption of critical
business operations: data backup, disaster recovery and emergency mode
operation. Evaluate cloud services providers (CSPs) for the depth of their service
capabilities and commitments in each context.
1
Data backup, disaster recovery
and emergency operation mode...
The Three Plans -
2
...must accurately reflect the procedures
that the organization actually uses.
They must be updated as procedures change in order to remain relevant and
accurate.Any changes the storage provider makes must also be reflected.
2
top-notch cloud security, it
may not be neccessary to be...
Even if a CSP offers
3
...HIPAA Compliant.
Look for providers that boast of HIPAA compliance and have them
prove it. Ask for audit documentation.
3
a Business Associate Agreement
(BAA) is table stakes for any CSP...
A willingness to sign
4
...Worth doing business with
so make sure the one you are considering will do so.
4
states that CSPs (and other
third-party provers...)
5
The HIPAA Security Rule
...(classified as business associates)
have a framework in place to comply with HIPAA requirements. It’s up to you to
ensure that is the case so get documentation from anyCSP you work with that
outlines this framework.
5
to ask a vendor to back up
your data in its cloud...
It may seem unnecessary
6
...but don’t be lulled into complacency.
Discuss retention policies and backup methods upfront with prospectiveCSPs.
They should be able to meet your organization’s requirements and any regulatory
requirements.
6
must be able to tell you
precisely where your ePHI is...
Any CSP you work with
7
...Physically stored.
Providers who cannot pinpoint data location or that rely on non-U.S. based
storage are not HIPAA compliant. Know what the HIPAA requirements are in this
regard, and make sure theCSP can meet them.
7
or attitudes toward data
ownership and access.
Dig into a vendors policy
8
This can be crucial
for protecting your organization if your provider runs into business issues
down the road.
8
access and attempted access
to your data.
HIPAA requires that you audit
9
Work with your provider
to ensure the hardware, software and/or procedural mechanisms that
record and examine ePHI-related activity are implemented.
9
the data backup methodology
you use and be certain...
Accurately document
10
...that it fulfills the HIPAA requirement
to create and maintain retrievable exact copies of ePHI.
10
If you’re wondering which service provider has one of the
industry’s most comprehensive compliance programs for
infrastructure, cloud and managed services, look no further
than Peak 10 - in it with you, today and tomorrow.
Call to action here.

More Related Content

What's hot

HIPAA | HIPAA Training
HIPAA | HIPAA TrainingHIPAA | HIPAA Training
HIPAA | HIPAA Training
himalya sharma
 
Hipaa privacy and security real world cases and breach determinations
Hipaa privacy and security   real world cases and breach determinationsHipaa privacy and security   real world cases and breach determinations
Hipaa privacy and security real world cases and breach determinations
Compliance Trainings
 
EHR Integration: The Decision to Build or Buy
EHR Integration: The Decision to Build or BuyEHR Integration: The Decision to Build or Buy
EHR Integration: The Decision to Build or Buy
Redox Engine
 
Privacy Policy for Quake Nepal
Privacy Policy for Quake NepalPrivacy Policy for Quake Nepal
Privacy Policy for Quake Nepal
Mahesh Dahal
 
Integrating PRO Solutions with Health System EHRs
Integrating PRO Solutions with Health System EHRsIntegrating PRO Solutions with Health System EHRs
Integrating PRO Solutions with Health System EHRs
Redox Engine
 
6 Steps to Meet Regulatory Compliance
6 Steps to Meet Regulatory Compliance6 Steps to Meet Regulatory Compliance
6 Steps to Meet Regulatory Compliance
EnviroSolutions & Consulting
 
HIPAA | HIPAA Training
HIPAA | HIPAA TrainingHIPAA | HIPAA Training
HIPAA | HIPAA Training
himalya sharma
 
Hipaa privacy and security 2014 update, including the latest trends in omnibu...
Hipaa privacy and security 2014 update, including the latest trends in omnibu...Hipaa privacy and security 2014 update, including the latest trends in omnibu...
Hipaa privacy and security 2014 update, including the latest trends in omnibu...
Compliance Trainings
 
Webinar on how to implement hipaa requirements in gx p regulated establishments
Webinar on how to implement hipaa requirements in gx p regulated establishmentsWebinar on how to implement hipaa requirements in gx p regulated establishments
Webinar on how to implement hipaa requirements in gx p regulated establishments
Compliance Trainings
 
HIPAA Conduit Exception: The Facts
HIPAA Conduit Exception: The FactsHIPAA Conduit Exception: The Facts
HIPAA Conduit Exception: The Facts
Scrypt, Inc.
 
Redox Overview deck
Redox Overview deckRedox Overview deck
Redox Overview deck
Redox Engine
 
Solving Interoperability: The Redox API
Solving Interoperability: The Redox APISolving Interoperability: The Redox API
Solving Interoperability: The Redox API
Redox Engine
 
Covenant SharePoint Health Assessment
Covenant SharePoint Health AssessmentCovenant SharePoint Health Assessment
Covenant SharePoint Health Assessment
Matthew W. Bowers
 
Tips For Being Compliance Ready
Tips For Being Compliance ReadyTips For Being Compliance Ready
Tips For Being Compliance Ready
Peak 10
 
Building an API for EHR integration at scale
Building an API for EHR integration at scaleBuilding an API for EHR integration at scale
Building an API for EHR integration at scale
Redox Engine
 
Identity Management as a Compliance Booster
Identity Management as a Compliance BoosterIdentity Management as a Compliance Booster
Identity Management as a Compliance Booster
Maëlle Piquée
 
Identity Management as a Compliance Booster
Identity Management as a Compliance BoosterIdentity Management as a Compliance Booster
Identity Management as a Compliance Booster
Identity Maestro
 
Simple Cost-Effective Strategies for Securing Documents in Your Therapy Practice
Simple Cost-Effective Strategies for Securing Documents in Your Therapy PracticeSimple Cost-Effective Strategies for Securing Documents in Your Therapy Practice
Simple Cost-Effective Strategies for Securing Documents in Your Therapy Practice
A Green
 
Redox_Overview (1)
Redox_Overview (1)Redox_Overview (1)
Redox_Overview (1)
Dharmaraj Indurthy
 
Redox-Overview-Aug18
Redox-Overview-Aug18Redox-Overview-Aug18
Redox-Overview-Aug18
George McLaughlin
 

What's hot (20)

HIPAA | HIPAA Training
HIPAA | HIPAA TrainingHIPAA | HIPAA Training
HIPAA | HIPAA Training
 
Hipaa privacy and security real world cases and breach determinations
Hipaa privacy and security   real world cases and breach determinationsHipaa privacy and security   real world cases and breach determinations
Hipaa privacy and security real world cases and breach determinations
 
EHR Integration: The Decision to Build or Buy
EHR Integration: The Decision to Build or BuyEHR Integration: The Decision to Build or Buy
EHR Integration: The Decision to Build or Buy
 
Privacy Policy for Quake Nepal
Privacy Policy for Quake NepalPrivacy Policy for Quake Nepal
Privacy Policy for Quake Nepal
 
Integrating PRO Solutions with Health System EHRs
Integrating PRO Solutions with Health System EHRsIntegrating PRO Solutions with Health System EHRs
Integrating PRO Solutions with Health System EHRs
 
6 Steps to Meet Regulatory Compliance
6 Steps to Meet Regulatory Compliance6 Steps to Meet Regulatory Compliance
6 Steps to Meet Regulatory Compliance
 
HIPAA | HIPAA Training
HIPAA | HIPAA TrainingHIPAA | HIPAA Training
HIPAA | HIPAA Training
 
Hipaa privacy and security 2014 update, including the latest trends in omnibu...
Hipaa privacy and security 2014 update, including the latest trends in omnibu...Hipaa privacy and security 2014 update, including the latest trends in omnibu...
Hipaa privacy and security 2014 update, including the latest trends in omnibu...
 
Webinar on how to implement hipaa requirements in gx p regulated establishments
Webinar on how to implement hipaa requirements in gx p regulated establishmentsWebinar on how to implement hipaa requirements in gx p regulated establishments
Webinar on how to implement hipaa requirements in gx p regulated establishments
 
HIPAA Conduit Exception: The Facts
HIPAA Conduit Exception: The FactsHIPAA Conduit Exception: The Facts
HIPAA Conduit Exception: The Facts
 
Redox Overview deck
Redox Overview deckRedox Overview deck
Redox Overview deck
 
Solving Interoperability: The Redox API
Solving Interoperability: The Redox APISolving Interoperability: The Redox API
Solving Interoperability: The Redox API
 
Covenant SharePoint Health Assessment
Covenant SharePoint Health AssessmentCovenant SharePoint Health Assessment
Covenant SharePoint Health Assessment
 
Tips For Being Compliance Ready
Tips For Being Compliance ReadyTips For Being Compliance Ready
Tips For Being Compliance Ready
 
Building an API for EHR integration at scale
Building an API for EHR integration at scaleBuilding an API for EHR integration at scale
Building an API for EHR integration at scale
 
Identity Management as a Compliance Booster
Identity Management as a Compliance BoosterIdentity Management as a Compliance Booster
Identity Management as a Compliance Booster
 
Identity Management as a Compliance Booster
Identity Management as a Compliance BoosterIdentity Management as a Compliance Booster
Identity Management as a Compliance Booster
 
Simple Cost-Effective Strategies for Securing Documents in Your Therapy Practice
Simple Cost-Effective Strategies for Securing Documents in Your Therapy PracticeSimple Cost-Effective Strategies for Securing Documents in Your Therapy Practice
Simple Cost-Effective Strategies for Securing Documents in Your Therapy Practice
 
Redox_Overview (1)
Redox_Overview (1)Redox_Overview (1)
Redox_Overview (1)
 
Redox-Overview-Aug18
Redox-Overview-Aug18Redox-Overview-Aug18
Redox-Overview-Aug18
 

Similar to Tips for Securing ePHI in the Cloud

Healthcare Cloud Adoption – HIPAA Still the Major Priority
Healthcare Cloud Adoption – HIPAA Still the Major PriorityHealthcare Cloud Adoption – HIPAA Still the Major Priority
Healthcare Cloud Adoption – HIPAA Still the Major Priority
Medical Transcription Service Company
 
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
Ajeet Singh
 
HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations
OnRamp
 
How to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy Risk
TrustArc
 
Success with on line CRM
Success with on line CRMSuccess with on line CRM
Success with on line CRM
James Bogue
 
10 questions to ask your cloud provider
10 questions to ask your cloud provider10 questions to ask your cloud provider
10 questions to ask your cloud provider
HighQ
 
Security policy.pdf
Security policy.pdfSecurity policy.pdf
Security policy.pdf
Md. Sajjat Hossain
 
Cloud compliance test
Cloud compliance testCloud compliance test
Cloud compliance test
Prancer Io
 
GDPR Checklist Infographic
GDPR Checklist InfographicGDPR Checklist Infographic
GDPR Checklist Infographic
Connexica
 
An Overview of HIPAA Laws and Regulations.pdf
An Overview of HIPAA Laws and Regulations.pdfAn Overview of HIPAA Laws and Regulations.pdf
An Overview of HIPAA Laws and Regulations.pdf
SeasiaInfotech2
 
Salesforce Compliance Archiving with DataConnectiva
Salesforce Compliance Archiving with DataConnectivaSalesforce Compliance Archiving with DataConnectiva
Salesforce Compliance Archiving with DataConnectiva
DataConnectiva
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
Enov8
 
Gain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldGain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless World
Qualys
 
Top 5 Strategies in Mastering Compliance with Salesforce Data Archiving
Top 5 Strategies in Mastering Compliance with Salesforce Data ArchivingTop 5 Strategies in Mastering Compliance with Salesforce Data Archiving
Top 5 Strategies in Mastering Compliance with Salesforce Data Archiving
DataArchiva
 
Healthcare Portals: 5 Core Items for an Exceptional Digital Experience
Healthcare Portals: 5 Core Items for an Exceptional Digital ExperienceHealthcare Portals: 5 Core Items for an Exceptional Digital Experience
Healthcare Portals: 5 Core Items for an Exceptional Digital Experience
Perficient, Inc.
 
Compliance is a Team Project
Compliance is a Team ProjectCompliance is a Team Project
Compliance is a Team Project
The TNS Group
 
Data Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdfData Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdf
Agusto Sipahutar
 
web-MINImag
web-MINImagweb-MINImag
web-MINImag
Allison Walton
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
Martin Bioh
 
Security with Cloud Computing
Security with Cloud ComputingSecurity with Cloud Computing
Security with Cloud Computing
Martin Bioh
 

Similar to Tips for Securing ePHI in the Cloud (20)

Healthcare Cloud Adoption – HIPAA Still the Major Priority
Healthcare Cloud Adoption – HIPAA Still the Major PriorityHealthcare Cloud Adoption – HIPAA Still the Major Priority
Healthcare Cloud Adoption – HIPAA Still the Major Priority
 
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
 
HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations
 
How to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy Risk
 
Success with on line CRM
Success with on line CRMSuccess with on line CRM
Success with on line CRM
 
10 questions to ask your cloud provider
10 questions to ask your cloud provider10 questions to ask your cloud provider
10 questions to ask your cloud provider
 
Security policy.pdf
Security policy.pdfSecurity policy.pdf
Security policy.pdf
 
Cloud compliance test
Cloud compliance testCloud compliance test
Cloud compliance test
 
GDPR Checklist Infographic
GDPR Checklist InfographicGDPR Checklist Infographic
GDPR Checklist Infographic
 
An Overview of HIPAA Laws and Regulations.pdf
An Overview of HIPAA Laws and Regulations.pdfAn Overview of HIPAA Laws and Regulations.pdf
An Overview of HIPAA Laws and Regulations.pdf
 
Salesforce Compliance Archiving with DataConnectiva
Salesforce Compliance Archiving with DataConnectivaSalesforce Compliance Archiving with DataConnectiva
Salesforce Compliance Archiving with DataConnectiva
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
 
Gain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldGain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless World
 
Top 5 Strategies in Mastering Compliance with Salesforce Data Archiving
Top 5 Strategies in Mastering Compliance with Salesforce Data ArchivingTop 5 Strategies in Mastering Compliance with Salesforce Data Archiving
Top 5 Strategies in Mastering Compliance with Salesforce Data Archiving
 
Healthcare Portals: 5 Core Items for an Exceptional Digital Experience
Healthcare Portals: 5 Core Items for an Exceptional Digital ExperienceHealthcare Portals: 5 Core Items for an Exceptional Digital Experience
Healthcare Portals: 5 Core Items for an Exceptional Digital Experience
 
Compliance is a Team Project
Compliance is a Team ProjectCompliance is a Team Project
Compliance is a Team Project
 
Data Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdfData Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdf
 
web-MINImag
web-MINImagweb-MINImag
web-MINImag
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
Security with Cloud Computing
Security with Cloud ComputingSecurity with Cloud Computing
Security with Cloud Computing
 

More from Peak 10

10-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-1610-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-16
Peak 10
 
7_Questions_DR_Plan_6-23-16
7_Questions_DR_Plan_6-23-167_Questions_DR_Plan_6-23-16
7_Questions_DR_Plan_6-23-16
Peak 10
 
IT Industry terms, a guide to getting it right.
IT Industry terms, a guide to getting it right.IT Industry terms, a guide to getting it right.
IT Industry terms, a guide to getting it right.
Peak 10
 
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of Choice
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of ChoiceTOP 10 Reasons to Make Peak 10 Your Cloud Provider of Choice
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of Choice
Peak 10
 
Advantages of Converged Infrastructures
Advantages of Converged InfrastructuresAdvantages of Converged Infrastructures
Advantages of Converged Infrastructures
Peak 10
 
New Tampa Data Center - Peak 10
New Tampa Data Center - Peak 10New Tampa Data Center - Peak 10
New Tampa Data Center - Peak 10
Peak 10
 
Cloud Migration
Cloud Migration Cloud Migration
Cloud Migration
Peak 10
 
Buyers Guide To Cloud
Buyers Guide To CloudBuyers Guide To Cloud
Buyers Guide To Cloud
Peak 10
 
Governance Tips for Midmarket IT Leaders
Governance Tips for Midmarket IT LeadersGovernance Tips for Midmarket IT Leaders
Governance Tips for Midmarket IT Leaders
Peak 10
 
Top 10 Reasons for Colocation
Top 10 Reasons for ColocationTop 10 Reasons for Colocation
Top 10 Reasons for Colocation
Peak 10
 
Security Hurts Business - Don't Let It
Security Hurts Business - Don't Let ItSecurity Hurts Business - Don't Let It
Security Hurts Business - Don't Let It
Peak 10
 
How to solve your IT problems in 7 days
How to solve your IT problems in 7 daysHow to solve your IT problems in 7 days
How to solve your IT problems in 7 days
Peak 10
 
The Whats, Whys and Hows of Database as a Service
The Whats, Whys and Hows of Database as a ServiceThe Whats, Whys and Hows of Database as a Service
The Whats, Whys and Hows of Database as a Service
Peak 10
 
13 Tips for Cloud Security
13 Tips for Cloud Security13 Tips for Cloud Security
13 Tips for Cloud Security
Peak 10
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
Peak 10
 
10 Tech Trends for 2014
10 Tech Trends for 201410 Tech Trends for 2014
10 Tech Trends for 2014
Peak 10
 
Five Workload-to-Cloud Migration Methods
Five Workload-to-Cloud Migration MethodsFive Workload-to-Cloud Migration Methods
Five Workload-to-Cloud Migration Methods
Peak 10
 
Peak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered DesktopPeak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered Desktop
Peak 10
 
CIO: Your Survival Guide
CIO: Your Survival GuideCIO: Your Survival Guide
CIO: Your Survival Guide
Peak 10
 

More from Peak 10 (19)

10-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-1610-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-16
 
7_Questions_DR_Plan_6-23-16
7_Questions_DR_Plan_6-23-167_Questions_DR_Plan_6-23-16
7_Questions_DR_Plan_6-23-16
 
IT Industry terms, a guide to getting it right.
IT Industry terms, a guide to getting it right.IT Industry terms, a guide to getting it right.
IT Industry terms, a guide to getting it right.
 
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of Choice
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of ChoiceTOP 10 Reasons to Make Peak 10 Your Cloud Provider of Choice
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of Choice
 
Advantages of Converged Infrastructures
Advantages of Converged InfrastructuresAdvantages of Converged Infrastructures
Advantages of Converged Infrastructures
 
New Tampa Data Center - Peak 10
New Tampa Data Center - Peak 10New Tampa Data Center - Peak 10
New Tampa Data Center - Peak 10
 
Cloud Migration
Cloud Migration Cloud Migration
Cloud Migration
 
Buyers Guide To Cloud
Buyers Guide To CloudBuyers Guide To Cloud
Buyers Guide To Cloud
 
Governance Tips for Midmarket IT Leaders
Governance Tips for Midmarket IT LeadersGovernance Tips for Midmarket IT Leaders
Governance Tips for Midmarket IT Leaders
 
Top 10 Reasons for Colocation
Top 10 Reasons for ColocationTop 10 Reasons for Colocation
Top 10 Reasons for Colocation
 
Security Hurts Business - Don't Let It
Security Hurts Business - Don't Let ItSecurity Hurts Business - Don't Let It
Security Hurts Business - Don't Let It
 
How to solve your IT problems in 7 days
How to solve your IT problems in 7 daysHow to solve your IT problems in 7 days
How to solve your IT problems in 7 days
 
The Whats, Whys and Hows of Database as a Service
The Whats, Whys and Hows of Database as a ServiceThe Whats, Whys and Hows of Database as a Service
The Whats, Whys and Hows of Database as a Service
 
13 Tips for Cloud Security
13 Tips for Cloud Security13 Tips for Cloud Security
13 Tips for Cloud Security
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
 
10 Tech Trends for 2014
10 Tech Trends for 201410 Tech Trends for 2014
10 Tech Trends for 2014
 
Five Workload-to-Cloud Migration Methods
Five Workload-to-Cloud Migration MethodsFive Workload-to-Cloud Migration Methods
Five Workload-to-Cloud Migration Methods
 
Peak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered DesktopPeak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered Desktop
 
CIO: Your Survival Guide
CIO: Your Survival GuideCIO: Your Survival Guide
CIO: Your Survival Guide
 

Recently uploaded

How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 

Recently uploaded (20)

How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 

Tips for Securing ePHI in the Cloud

  • 1. Tips for Securing ePHI in the Cloud
  • 2. When it comes to entrusting your electronic protected health information (ePHI) to a third-party cloud services provider, security is arguably the biggest concern. A lot of factors must be considered when looking for qualified providers you can work with and who want to work with you. Here are some considerations.
  • 3. covered entities are required to have three plans... Under the HIPAA Security Rule, 1
  • 4. ...for recovering access to ePHI should the organization experience an emergency or a disruption of critical business operations: data backup, disaster recovery and emergency mode operation. Evaluate cloud services providers (CSPs) for the depth of their service capabilities and commitments in each context. 1
  • 5. Data backup, disaster recovery and emergency operation mode... The Three Plans - 2
  • 6. ...must accurately reflect the procedures that the organization actually uses. They must be updated as procedures change in order to remain relevant and accurate.Any changes the storage provider makes must also be reflected. 2
  • 7. top-notch cloud security, it may not be neccessary to be... Even if a CSP offers 3
  • 8. ...HIPAA Compliant. Look for providers that boast of HIPAA compliance and have them prove it. Ask for audit documentation. 3
  • 9. a Business Associate Agreement (BAA) is table stakes for any CSP... A willingness to sign 4
  • 10. ...Worth doing business with so make sure the one you are considering will do so. 4
  • 11. states that CSPs (and other third-party provers...) 5 The HIPAA Security Rule
  • 12. ...(classified as business associates) have a framework in place to comply with HIPAA requirements. It’s up to you to ensure that is the case so get documentation from anyCSP you work with that outlines this framework. 5
  • 13. to ask a vendor to back up your data in its cloud... It may seem unnecessary 6
  • 14. ...but don’t be lulled into complacency. Discuss retention policies and backup methods upfront with prospectiveCSPs. They should be able to meet your organization’s requirements and any regulatory requirements. 6
  • 15. must be able to tell you precisely where your ePHI is... Any CSP you work with 7
  • 16. ...Physically stored. Providers who cannot pinpoint data location or that rely on non-U.S. based storage are not HIPAA compliant. Know what the HIPAA requirements are in this regard, and make sure theCSP can meet them. 7
  • 17. or attitudes toward data ownership and access. Dig into a vendors policy 8
  • 18. This can be crucial for protecting your organization if your provider runs into business issues down the road. 8
  • 19. access and attempted access to your data. HIPAA requires that you audit 9
  • 20. Work with your provider to ensure the hardware, software and/or procedural mechanisms that record and examine ePHI-related activity are implemented. 9
  • 21. the data backup methodology you use and be certain... Accurately document 10
  • 22. ...that it fulfills the HIPAA requirement to create and maintain retrievable exact copies of ePHI. 10
  • 23. If you’re wondering which service provider has one of the industry’s most comprehensive compliance programs for infrastructure, cloud and managed services, look no further than Peak 10 - in it with you, today and tomorrow. Call to action here.