SlideShare a Scribd company logo
WHY SMS IS NOT HIPAA COMPLIANT *
                                                                                 *or, more accurately, “Why SMS does not support HIPAA compliance




                                                                                                              This diagram has been simplified to illustrate the movement of text message data through a typical GSM (Global System
    TYPICAL DATA FLOW OF A TEXT MESSAGE OVER A GSM NETWORK                                                    for Mobile Communications) network. In particular, the message acknowledgement process as well as routing requests
                                                                                                              through the Home Location Register (HLR) and the Visitor Location Register (VLR) have been omitted.




1   Sender submits text message, which contains the short
    message (SM) text, destination address, and address of
    the SMS Center (SMSC); handset sends the message
    over the air (OTA).
                                                                           4      The SMSC stores a copy of the message where it is retained for a
                                                                                  period of time known as the “validity period” The SMSC simultane-
                                                                                                                                .
                                                                                  ously attempts to deliver a copy of the message to the recipient. In
                                                                                  order to locate the recipient, the SMSC sends a routing request to the


                                                                                                                                                                            6
                                                                                  Home Location Register (HLR). The HLR locates the recipient and sends                            The MSC routes the message
                                                                                  correct routing information back to the SMSC.

                  2
                                                                                                                                                                                   to the correct base station.
                         Signal received by tower and processed by
                         the base station and then sent to the


                                                                                                                 5
                         Mobile Switching Center (MSC).
                                                                                                                        The SMSC then forwards the message to

                                                                                                                                                                                           7
                                                                                                                        the recipient’s servicing MSC. The MSC will                                The message is processed by the

                                               3      MSC routes the message to the
                                                      SMSC identified in the message.
                                                                                                                        request the recipient’s current location
                                                                                                                        from the Visitor Location Register.
                                                                                                                                                                                                   base station and transmitted to
                                                                                                                                                                                                   the recipient’s handset.




                                                                                                    SMS
                                                                                                   CENTER
                                                                 MOBILE                                                                  MOBILE
                                          BASE                  SWITCHING                                                               SWITCHING                          BASE
                                         STATION                                                                                                                          STATION
                                                                 CENTER                                                                  CENTER




    SECURITY VULNERABILITIES


A   PHYSICAL SECURITY                                                                                    C    INTERCEPTION
    The physical security of the phone or other mobile device itself represents the greatest                  As the SMS message is sent from the base station to the MSC and then on to the SMSC, it passes
G   vulnerability for information being inappropriately accessed. In a default configuration, devices    E    over the carrier’s network unencrypted, making it susceptible to interception.
    do not require a user to authenticate with security credentials to access device applications and
    data. Additionally, information is stored in clear text, or unencrypted, in the native messaging
    application where it can be readily accessed, manipulated and/or removed. Finally, if a device is    D    STORE & FORWARD
    lost or stolen, there is no way to remotely lock or wipe data to prevent unauthorized access.             When the SMS message arrives at the SMSC, a copy is stored in clear text on the carrier’s server
                                                                                                              where it is held for the “validity period”, pending successful delivery of the message. While the
                                                                                                              GSM implementation of SMS allows the sender’s SMSC to deliver the message directly to the
    EAVESDROPPING                                                                                             recipient’s MSC, CDMA (which includes both Sprint and Verizon networks in the US) requires a copy
B                                                                                                             of the message to be sent to the recipient’s SMSC where a copy of the message is also stored and
    During OTA transmission, the signal - including voice and text data - is optionally encrypted
    (meaning it is up to the specific carrier) using a weak and broken stream cipher (A5/1 or A5/2).          forwarded. This means that for messages sent within CDMA or across networks (GSM <-> CDMA) at
F
    Both A5/1 and the encryption algorithm used to secure GPRS (General Packet Radio Service)                 least two copies of the message are retained in clear text, accessible by carrier personnel with
    have been broken within the last couple of years, demonstrating the susceptibility of these               SMSC access. Finally, even more copies of the message may be stored if one or more SMS gateways
    transmissions to eavesdropping.                                                                           are used to facilitate message delivery across carriers using incompatible technologies.


                                                                                                                                                                                                   © 2012 qliqSoft, Inc. All rights reserved.
WHY SMS IS NOT HIPAA COMPLIANT *
                                                                          *or, more accurately, “Why SMS does not support HIPAA compliance




     HIPAA CONSIDERATIONS


According to the HIPAA Security Rule, Covered Entities and Business Associates acting on               PHYSICAL SAFEGUARD CHALLENGES
their behalf are required to implement a number of technical and non-technical safeguards
if they transmit or otherwise maintain electronic protected health information (ePHI). As a
                                                                                                         controls without defeating the core purpose of consumer wireless communications
result, if a member of a Covered Entity or one of its Business Associates uses SMS-based text
messaging to transmit PHI, then the Covered Entity or Business Associate is required to
comply with the safeguards outlined in the Security Rule.
                                                                                                         compliance, however infrastructure beyond the domain of the core facility, third-party
                                                                                                         providers and non-regulated facilities in foreign countries cannot be reliably managed.
Based on the security vulnerabilities described above, Covered Entities and Business
Associates confront the following compliance challenges when sending PHI via SMS:
                                                                                                       TECHNICAL SAFEGUARD CHALLENGES

ADMINISTRATIVE SAFEGUARD CHALLENGES
                                                                                                         not be implemented across heterogeneous networks and a disparate subscriber base.
                                                                    applied across all of
 the organizations involved in the transmission and delivery of SMS messages.



 ePHI with regard to access and audit controls, or personnel management. In SMS systems,
 there is no reliable means of identification of ePHI, and therefore no reliable means of
 segregation of the data for the purpose of focusing security controls. This condition also
 makes fulfillment of the required terms for Business Associate Agreements not feasible.




                                                                                                                                                                         © 2012 qliqSoft, Inc. All rights reserved.

More Related Content

Similar to Why SMS is not HIPAA compliant

Gsm overview 10
Gsm overview 10Gsm overview 10
Gsm overview 10Percyjm
 
gsm_call_routing.pptx
gsm_call_routing.pptxgsm_call_routing.pptx
gsm_call_routing.pptx
Milanap1
 
Moc mtc
Moc mtcMoc mtc
Moc mtc
Razzaqe
 
Location Updating
Location UpdatingLocation Updating
Location UpdatingSokunth Che
 
MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...
MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...
MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...
satishnittana1
 
Mobile communication fundamental
Mobile communication fundamentalMobile communication fundamental
Mobile communication fundamental
THANDAIAH PRABU
 
Sms
Sms Sms
System Introduction
System IntroductionSystem Introduction
System IntroductionSokunth Che
 
Switching System
Switching SystemSwitching System
Switching SystemSokunth Che
 
Definition msc
Definition mscDefinition msc
Definition msc
eieiswe
 
Gsm Originating Call Flow
Gsm Originating Call FlowGsm Originating Call Flow
Gsm Originating Call FlowDeepak Sharma
 
Gsm originating call_flow
Gsm originating call_flowGsm originating call_flow
Gsm originating call_flowRamijazzar
 
Call flow
Call flowCall flow
Handover call_flow in GSM
 Handover call_flow in GSM Handover call_flow in GSM
Handover call_flow in GSM
virender123243
 
Handover call_flow in GSM
 Handover call_flow in GSM Handover call_flow in GSM
Handover call_flow in GSM
virender123243
 
GSM_Handover_Call_Flow
GSM_Handover_Call_FlowGSM_Handover_Call_Flow
GSM_Handover_Call_FlowAvinash Kumar
 
Ch6
Ch6Ch6

Similar to Why SMS is not HIPAA compliant (20)

Call Setup
Call SetupCall Setup
Call Setup
 
Gsm overview 10
Gsm overview 10Gsm overview 10
Gsm overview 10
 
SMS
SMSSMS
SMS
 
gsm_call_routing.pptx
gsm_call_routing.pptxgsm_call_routing.pptx
gsm_call_routing.pptx
 
Moc mtc
Moc mtcMoc mtc
Moc mtc
 
five
fivefive
five
 
Location Updating
Location UpdatingLocation Updating
Location Updating
 
MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...
MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...
MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...
 
Mobile communication fundamental
Mobile communication fundamentalMobile communication fundamental
Mobile communication fundamental
 
Sms
Sms Sms
Sms
 
System Introduction
System IntroductionSystem Introduction
System Introduction
 
Switching System
Switching SystemSwitching System
Switching System
 
Definition msc
Definition mscDefinition msc
Definition msc
 
Gsm Originating Call Flow
Gsm Originating Call FlowGsm Originating Call Flow
Gsm Originating Call Flow
 
Gsm originating call_flow
Gsm originating call_flowGsm originating call_flow
Gsm originating call_flow
 
Call flow
Call flowCall flow
Call flow
 
Handover call_flow in GSM
 Handover call_flow in GSM Handover call_flow in GSM
Handover call_flow in GSM
 
Handover call_flow in GSM
 Handover call_flow in GSM Handover call_flow in GSM
Handover call_flow in GSM
 
GSM_Handover_Call_Flow
GSM_Handover_Call_FlowGSM_Handover_Call_Flow
GSM_Handover_Call_Flow
 
Ch6
Ch6Ch6
Ch6
 

More from qliqSoft

Secure Texting Best Practices: Connect with External Organizations
Secure Texting Best Practices: Connect with External OrganizationsSecure Texting Best Practices: Connect with External Organizations
Secure Texting Best Practices: Connect with External Organizations
qliqSoft
 
Secure Texting Best Practices: Supercharge Your Implementation Plan
Secure Texting Best Practices: Supercharge Your Implementation PlanSecure Texting Best Practices: Supercharge Your Implementation Plan
Secure Texting Best Practices: Supercharge Your Implementation Plan
qliqSoft
 
Secure Texting Best Practices: Communicate Your Policies
Secure Texting Best Practices: Communicate Your PoliciesSecure Texting Best Practices: Communicate Your Policies
Secure Texting Best Practices: Communicate Your Policies
qliqSoft
 
Secure Texting Best Practices: Get Your Organization On Board
Secure Texting Best Practices: Get Your Organization On BoardSecure Texting Best Practices: Get Your Organization On Board
Secure Texting Best Practices: Get Your Organization On Board
qliqSoft
 
Secure Texting Best Practices: Identify Your Goals
Secure Texting Best Practices: Identify Your GoalsSecure Texting Best Practices: Identify Your Goals
Secure Texting Best Practices: Identify Your Goals
qliqSoft
 
HIPAA compliance statement
HIPAA compliance statementHIPAA compliance statement
HIPAA compliance statementqliqSoft
 

More from qliqSoft (6)

Secure Texting Best Practices: Connect with External Organizations
Secure Texting Best Practices: Connect with External OrganizationsSecure Texting Best Practices: Connect with External Organizations
Secure Texting Best Practices: Connect with External Organizations
 
Secure Texting Best Practices: Supercharge Your Implementation Plan
Secure Texting Best Practices: Supercharge Your Implementation PlanSecure Texting Best Practices: Supercharge Your Implementation Plan
Secure Texting Best Practices: Supercharge Your Implementation Plan
 
Secure Texting Best Practices: Communicate Your Policies
Secure Texting Best Practices: Communicate Your PoliciesSecure Texting Best Practices: Communicate Your Policies
Secure Texting Best Practices: Communicate Your Policies
 
Secure Texting Best Practices: Get Your Organization On Board
Secure Texting Best Practices: Get Your Organization On BoardSecure Texting Best Practices: Get Your Organization On Board
Secure Texting Best Practices: Get Your Organization On Board
 
Secure Texting Best Practices: Identify Your Goals
Secure Texting Best Practices: Identify Your GoalsSecure Texting Best Practices: Identify Your Goals
Secure Texting Best Practices: Identify Your Goals
 
HIPAA compliance statement
HIPAA compliance statementHIPAA compliance statement
HIPAA compliance statement
 

Recently uploaded

ANATOMY AND PHYSIOLOGY OF URINARY SYSTEM.pptx
ANATOMY AND PHYSIOLOGY OF URINARY SYSTEM.pptxANATOMY AND PHYSIOLOGY OF URINARY SYSTEM.pptx
ANATOMY AND PHYSIOLOGY OF URINARY SYSTEM.pptx
Swetaba Besh
 
Novas diretrizes da OMS para os cuidados perinatais de mais qualidade
Novas diretrizes da OMS para os cuidados perinatais de mais qualidadeNovas diretrizes da OMS para os cuidados perinatais de mais qualidade
Novas diretrizes da OMS para os cuidados perinatais de mais qualidade
Prof. Marcus Renato de Carvalho
 
ARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTS
ARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTSARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTS
ARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTS
Dr. Vinay Pareek
 
Physiology of Chemical Sensation of smell.pdf
Physiology of Chemical Sensation of smell.pdfPhysiology of Chemical Sensation of smell.pdf
Physiology of Chemical Sensation of smell.pdf
MedicoseAcademics
 
Maxilla, Mandible & Hyoid Bone & Clinical Correlations by Dr. RIG.pptx
Maxilla, Mandible & Hyoid Bone & Clinical Correlations by Dr. RIG.pptxMaxilla, Mandible & Hyoid Bone & Clinical Correlations by Dr. RIG.pptx
Maxilla, Mandible & Hyoid Bone & Clinical Correlations by Dr. RIG.pptx
Dr. Rabia Inam Gandapore
 
KDIGO 2024 guidelines for diabetologists
KDIGO 2024 guidelines for diabetologistsKDIGO 2024 guidelines for diabetologists
KDIGO 2024 guidelines for diabetologists
د.محمود نجيب
 
How to Give Better Lectures: Some Tips for Doctors
How to Give Better Lectures: Some Tips for DoctorsHow to Give Better Lectures: Some Tips for Doctors
How to Give Better Lectures: Some Tips for Doctors
LanceCatedral
 
Evaluation of antidepressant activity of clitoris ternatea in animals
Evaluation of antidepressant activity of clitoris ternatea in animalsEvaluation of antidepressant activity of clitoris ternatea in animals
Evaluation of antidepressant activity of clitoris ternatea in animals
Shweta
 
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?Report Back from SGO 2024: What’s the Latest in Cervical Cancer?
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?
bkling
 
Surat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model Safe
Surat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model SafeSurat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model Safe
Surat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model Safe
Savita Shen $i11
 
New Drug Discovery and Development .....
New Drug Discovery and Development .....New Drug Discovery and Development .....
New Drug Discovery and Development .....
NEHA GUPTA
 
TEST BANK for Operations Management, 14th Edition by William J. Stevenson, Ve...
TEST BANK for Operations Management, 14th Edition by William J. Stevenson, Ve...TEST BANK for Operations Management, 14th Edition by William J. Stevenson, Ve...
TEST BANK for Operations Management, 14th Edition by William J. Stevenson, Ve...
kevinkariuki227
 
Alcohol_Dr. Jeenal Mistry MD Pharmacology.pdf
Alcohol_Dr. Jeenal Mistry MD Pharmacology.pdfAlcohol_Dr. Jeenal Mistry MD Pharmacology.pdf
Alcohol_Dr. Jeenal Mistry MD Pharmacology.pdf
Dr Jeenal Mistry
 
POST OPERATIVE OLIGURIA and its management
POST OPERATIVE OLIGURIA and its managementPOST OPERATIVE OLIGURIA and its management
POST OPERATIVE OLIGURIA and its management
touseefaziz1
 
basicmodesofventilation2022-220313203758.pdf
basicmodesofventilation2022-220313203758.pdfbasicmodesofventilation2022-220313203758.pdf
basicmodesofventilation2022-220313203758.pdf
aljamhori teaching hospital
 
Pulmonary Thromboembolism - etilogy, types, medical- Surgical and nursing man...
Pulmonary Thromboembolism - etilogy, types, medical- Surgical and nursing man...Pulmonary Thromboembolism - etilogy, types, medical- Surgical and nursing man...
Pulmonary Thromboembolism - etilogy, types, medical- Surgical and nursing man...
VarunMahajani
 
Flu Vaccine Alert in Bangalore Karnataka
Flu Vaccine Alert in Bangalore KarnatakaFlu Vaccine Alert in Bangalore Karnataka
Flu Vaccine Alert in Bangalore Karnataka
addon Scans
 
Ophthalmology Clinical Tests for OSCE exam
Ophthalmology Clinical Tests for OSCE examOphthalmology Clinical Tests for OSCE exam
Ophthalmology Clinical Tests for OSCE exam
KafrELShiekh University
 
Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists
Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists  Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists
Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists
Saeid Safari
 
ARTIFICIAL INTELLIGENCE IN HEALTHCARE.pdf
ARTIFICIAL INTELLIGENCE IN  HEALTHCARE.pdfARTIFICIAL INTELLIGENCE IN  HEALTHCARE.pdf
ARTIFICIAL INTELLIGENCE IN HEALTHCARE.pdf
Anujkumaranit
 

Recently uploaded (20)

ANATOMY AND PHYSIOLOGY OF URINARY SYSTEM.pptx
ANATOMY AND PHYSIOLOGY OF URINARY SYSTEM.pptxANATOMY AND PHYSIOLOGY OF URINARY SYSTEM.pptx
ANATOMY AND PHYSIOLOGY OF URINARY SYSTEM.pptx
 
Novas diretrizes da OMS para os cuidados perinatais de mais qualidade
Novas diretrizes da OMS para os cuidados perinatais de mais qualidadeNovas diretrizes da OMS para os cuidados perinatais de mais qualidade
Novas diretrizes da OMS para os cuidados perinatais de mais qualidade
 
ARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTS
ARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTSARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTS
ARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTS
 
Physiology of Chemical Sensation of smell.pdf
Physiology of Chemical Sensation of smell.pdfPhysiology of Chemical Sensation of smell.pdf
Physiology of Chemical Sensation of smell.pdf
 
Maxilla, Mandible & Hyoid Bone & Clinical Correlations by Dr. RIG.pptx
Maxilla, Mandible & Hyoid Bone & Clinical Correlations by Dr. RIG.pptxMaxilla, Mandible & Hyoid Bone & Clinical Correlations by Dr. RIG.pptx
Maxilla, Mandible & Hyoid Bone & Clinical Correlations by Dr. RIG.pptx
 
KDIGO 2024 guidelines for diabetologists
KDIGO 2024 guidelines for diabetologistsKDIGO 2024 guidelines for diabetologists
KDIGO 2024 guidelines for diabetologists
 
How to Give Better Lectures: Some Tips for Doctors
How to Give Better Lectures: Some Tips for DoctorsHow to Give Better Lectures: Some Tips for Doctors
How to Give Better Lectures: Some Tips for Doctors
 
Evaluation of antidepressant activity of clitoris ternatea in animals
Evaluation of antidepressant activity of clitoris ternatea in animalsEvaluation of antidepressant activity of clitoris ternatea in animals
Evaluation of antidepressant activity of clitoris ternatea in animals
 
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?Report Back from SGO 2024: What’s the Latest in Cervical Cancer?
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?
 
Surat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model Safe
Surat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model SafeSurat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model Safe
Surat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model Safe
 
New Drug Discovery and Development .....
New Drug Discovery and Development .....New Drug Discovery and Development .....
New Drug Discovery and Development .....
 
TEST BANK for Operations Management, 14th Edition by William J. Stevenson, Ve...
TEST BANK for Operations Management, 14th Edition by William J. Stevenson, Ve...TEST BANK for Operations Management, 14th Edition by William J. Stevenson, Ve...
TEST BANK for Operations Management, 14th Edition by William J. Stevenson, Ve...
 
Alcohol_Dr. Jeenal Mistry MD Pharmacology.pdf
Alcohol_Dr. Jeenal Mistry MD Pharmacology.pdfAlcohol_Dr. Jeenal Mistry MD Pharmacology.pdf
Alcohol_Dr. Jeenal Mistry MD Pharmacology.pdf
 
POST OPERATIVE OLIGURIA and its management
POST OPERATIVE OLIGURIA and its managementPOST OPERATIVE OLIGURIA and its management
POST OPERATIVE OLIGURIA and its management
 
basicmodesofventilation2022-220313203758.pdf
basicmodesofventilation2022-220313203758.pdfbasicmodesofventilation2022-220313203758.pdf
basicmodesofventilation2022-220313203758.pdf
 
Pulmonary Thromboembolism - etilogy, types, medical- Surgical and nursing man...
Pulmonary Thromboembolism - etilogy, types, medical- Surgical and nursing man...Pulmonary Thromboembolism - etilogy, types, medical- Surgical and nursing man...
Pulmonary Thromboembolism - etilogy, types, medical- Surgical and nursing man...
 
Flu Vaccine Alert in Bangalore Karnataka
Flu Vaccine Alert in Bangalore KarnatakaFlu Vaccine Alert in Bangalore Karnataka
Flu Vaccine Alert in Bangalore Karnataka
 
Ophthalmology Clinical Tests for OSCE exam
Ophthalmology Clinical Tests for OSCE examOphthalmology Clinical Tests for OSCE exam
Ophthalmology Clinical Tests for OSCE exam
 
Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists
Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists  Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists
Ozempic: Preoperative Management of Patients on GLP-1 Receptor Agonists
 
ARTIFICIAL INTELLIGENCE IN HEALTHCARE.pdf
ARTIFICIAL INTELLIGENCE IN  HEALTHCARE.pdfARTIFICIAL INTELLIGENCE IN  HEALTHCARE.pdf
ARTIFICIAL INTELLIGENCE IN HEALTHCARE.pdf
 

Why SMS is not HIPAA compliant

  • 1. WHY SMS IS NOT HIPAA COMPLIANT * *or, more accurately, “Why SMS does not support HIPAA compliance This diagram has been simplified to illustrate the movement of text message data through a typical GSM (Global System TYPICAL DATA FLOW OF A TEXT MESSAGE OVER A GSM NETWORK for Mobile Communications) network. In particular, the message acknowledgement process as well as routing requests through the Home Location Register (HLR) and the Visitor Location Register (VLR) have been omitted. 1 Sender submits text message, which contains the short message (SM) text, destination address, and address of the SMS Center (SMSC); handset sends the message over the air (OTA). 4 The SMSC stores a copy of the message where it is retained for a period of time known as the “validity period” The SMSC simultane- . ously attempts to deliver a copy of the message to the recipient. In order to locate the recipient, the SMSC sends a routing request to the 6 Home Location Register (HLR). The HLR locates the recipient and sends The MSC routes the message correct routing information back to the SMSC. 2 to the correct base station. Signal received by tower and processed by the base station and then sent to the 5 Mobile Switching Center (MSC). The SMSC then forwards the message to 7 the recipient’s servicing MSC. The MSC will The message is processed by the 3 MSC routes the message to the SMSC identified in the message. request the recipient’s current location from the Visitor Location Register. base station and transmitted to the recipient’s handset. SMS CENTER MOBILE MOBILE BASE SWITCHING SWITCHING BASE STATION STATION CENTER CENTER SECURITY VULNERABILITIES A PHYSICAL SECURITY C INTERCEPTION The physical security of the phone or other mobile device itself represents the greatest As the SMS message is sent from the base station to the MSC and then on to the SMSC, it passes G vulnerability for information being inappropriately accessed. In a default configuration, devices E over the carrier’s network unencrypted, making it susceptible to interception. do not require a user to authenticate with security credentials to access device applications and data. Additionally, information is stored in clear text, or unencrypted, in the native messaging application where it can be readily accessed, manipulated and/or removed. Finally, if a device is D STORE & FORWARD lost or stolen, there is no way to remotely lock or wipe data to prevent unauthorized access. When the SMS message arrives at the SMSC, a copy is stored in clear text on the carrier’s server where it is held for the “validity period”, pending successful delivery of the message. While the GSM implementation of SMS allows the sender’s SMSC to deliver the message directly to the EAVESDROPPING recipient’s MSC, CDMA (which includes both Sprint and Verizon networks in the US) requires a copy B of the message to be sent to the recipient’s SMSC where a copy of the message is also stored and During OTA transmission, the signal - including voice and text data - is optionally encrypted (meaning it is up to the specific carrier) using a weak and broken stream cipher (A5/1 or A5/2). forwarded. This means that for messages sent within CDMA or across networks (GSM <-> CDMA) at F Both A5/1 and the encryption algorithm used to secure GPRS (General Packet Radio Service) least two copies of the message are retained in clear text, accessible by carrier personnel with have been broken within the last couple of years, demonstrating the susceptibility of these SMSC access. Finally, even more copies of the message may be stored if one or more SMS gateways transmissions to eavesdropping. are used to facilitate message delivery across carriers using incompatible technologies. © 2012 qliqSoft, Inc. All rights reserved.
  • 2. WHY SMS IS NOT HIPAA COMPLIANT * *or, more accurately, “Why SMS does not support HIPAA compliance HIPAA CONSIDERATIONS According to the HIPAA Security Rule, Covered Entities and Business Associates acting on PHYSICAL SAFEGUARD CHALLENGES their behalf are required to implement a number of technical and non-technical safeguards if they transmit or otherwise maintain electronic protected health information (ePHI). As a controls without defeating the core purpose of consumer wireless communications result, if a member of a Covered Entity or one of its Business Associates uses SMS-based text messaging to transmit PHI, then the Covered Entity or Business Associate is required to comply with the safeguards outlined in the Security Rule. compliance, however infrastructure beyond the domain of the core facility, third-party providers and non-regulated facilities in foreign countries cannot be reliably managed. Based on the security vulnerabilities described above, Covered Entities and Business Associates confront the following compliance challenges when sending PHI via SMS: TECHNICAL SAFEGUARD CHALLENGES ADMINISTRATIVE SAFEGUARD CHALLENGES not be implemented across heterogeneous networks and a disparate subscriber base. applied across all of the organizations involved in the transmission and delivery of SMS messages. ePHI with regard to access and audit controls, or personnel management. In SMS systems, there is no reliable means of identification of ePHI, and therefore no reliable means of segregation of the data for the purpose of focusing security controls. This condition also makes fulfillment of the required terms for Business Associate Agreements not feasible. © 2012 qliqSoft, Inc. All rights reserved.