Guide to HIPAA Compliance
What Is It?
What Is HIPAA Compliance?
HIPAA stands for the Health Insurance Portability and Accountability Act. HIPAA provides data privacy and security provisions for safeguarding medical information. HIPAA is divided into five titles but adherence to HIPAA Title II is what is commonly known as HIPAA Compliance.
Who We Serve
Who Needs To Be HIPAA Compliant?
Health Care Providers
The term Health Care Provider includes any medical professional from primary care physicians to pharmacies and clinics.
Health Plans
Every health plan that offers medical services to its members, stores and transfers PHI.
Health Care Clearinghouses
A health care clearinghouse is a billing service, repricing company, or community health information system.
Standards
5 Rules and Standards for HIPAA Compliance
Each healthcare entity, including individuals, employers, health plans and healthcare providers, must have a unique 10-digit national provider identifier number, or NPI.
Healthcare organizations must follow a standardized mechanism for electronic data interchange (EDI) in order to submit and process insurance claims.
The HIPAA Privacy Rule is officially known as the Standards for Privacy of Individually Identifiable Health Information. This rule establishes national standards to protect patient health information.
This rule was issued to limit the use and disclosure of sensitive PHI. It protects the privacy of patients by requiring doctors to provide patients with an account of each entity to which the doctor discloses PHI for billing and administrative purposes. This provides accountability while still allowing health information to go through the proper channels.
The privacy rule also guarantees patients the right to receive their own PHI from healthcare providers.
The Security Standards for the Protection of Electronic Protected Health Information sets standards for patient data security.
This rule establishes guidelines for investigations into HIPAA compliance violations.
What Is Considered PHI?
- A patient’s name, address, birth date and Social Security number;
- An individual’s physical or mental health condition;
- Any care provided to an individual; or
- Information concerning the payment for the care provided to the individual that identifies the patient, or information for which there is a reasonable basis to believe could be used to identify the patient.
HIPAA Security Rule as it pertains to IT Security
The security rule requires covered entities to use three types of safeguards to protect ePHI:
- Security Management Process
- Security Personnel
- Information Access Management
- Workforce Training and Management
- Evaluation
- Facility Access and Control
- Workstation and Device Security
- Access Control
- Audit Controls
- Integrity Controls
- Transmission Security
Our Approach
Our 4-Step Approach to IT Compliance
1. Compliance Audit
Our team conducts a series of interviews and a network audit to determine data access and usage.
2. Gap Analysis
A gap analysis identifies the missing pieces necessary to achieve compliance.
3. Remediation Plan
A remediation plan is put forth and executed with action steps towards compliance based on priority level.
4. Management
ITonDemand then monitors system usage and provides the service and support to maintain compliance.
Compliance In Action
Florida Manufacturing Firm
A small north Florida manufactures CNC close tolerance machined parts, custom components, and assemblies for the defense sector. Given the sensitive nature of the parts being manufactured, it was vital that communications and manufacturing specifications were secure while organizational infrastructure was put in place and maintained to NIST Compliance.
Contact Us For Support
Need More From Your IT Services Provider?
ITonDemand is a division of eResources: your expert partner in digital transformation and growth, providing IT services, software development, marketing and branding. Learn more about the benefits of a vertically-integrated IT services partner.