Skip to content

Guide to HIPAA Compliance

What Is It?

What Is HIPAA Compliance?

HIPAA stands for the Health Insurance Portability and Accountability Act. HIPAA provides data privacy and security provisions for safeguarding medical information. HIPAA is divided into five titles but adherence to HIPAA Title II is what is commonly known as HIPAA Compliance.

Who We Serve

Who Needs To Be HIPAA Compliant?

Health Care Providers

The term Health Care Provider includes any medical professional from primary care physicians to pharmacies and clinics.

Health Plans

Every health plan that offers medical services to its members, stores and transfers PHI.

Health Care Clearinghouses

A health care clearinghouse is a billing service, repricing company, or community health information system.

Standards

5 Rules and Standards for HIPAA Compliance

Each healthcare entity, including individuals, employers, health plans and healthcare providers, must have a unique 10-digit national provider identifier number, or NPI.

Healthcare organizations must follow a standardized mechanism for electronic data interchange (EDI) in order to submit and process insurance claims.

The HIPAA Privacy Rule is officially known as the Standards for Privacy of Individually Identifiable Health Information. This rule establishes national standards to protect patient health information.

This rule was issued to limit the use and disclosure of sensitive PHI. It protects the privacy of patients by requiring doctors to provide patients with an account of each entity to which the doctor discloses PHI for billing and administrative purposes. This provides accountability while still allowing health information to go through the proper channels.

The privacy rule also guarantees patients the right to receive their own PHI from healthcare providers.

The Security Standards for the Protection of Electronic Protected Health Information sets standards for patient data security.

This rule establishes guidelines for investigations into HIPAA compliance violations.

What Is Considered PHI?

  • A patient’s name, address, birth date and Social Security number;
  • An individual’s physical or mental health condition;
  • Any care provided to an individual; or
  • Information concerning the payment for the care provided to the individual that identifies the patient, or information for which there is a reasonable basis to believe could be used to identify the patient.

HIPAA Security Rule as it pertains to IT Security

The security rule requires covered entities to use three types of safeguards to protect ePHI:

  • Security Management Process
  • Security Personnel
  • Information Access Management
  • Workforce Training and Management
  • Evaluation
  • Facility Access and Control
  • Workstation and Device Security
  • Access Control
  • Audit Controls
  • Integrity Controls
  • Transmission Security

Our Approach

Our 4-Step Approach to IT Compliance

1. Compliance Audit

Our team conducts a series of interviews and a network audit to determine data access and usage.

2. Gap Analysis

A gap analysis identifies the missing pieces necessary to achieve compliance.

3. Remediation Plan

A remediation plan is put forth and executed with action steps towards compliance based on priority level.

4. Management

ITonDemand then monitors system usage and provides the service and support to maintain compliance.

Compliance In Action

Florida Manufacturing Firm

A small north Florida manufactures CNC close tolerance machined parts, custom components, and assemblies for the defense sector. Given the sensitive nature of the parts being manufactured, it was vital that communications and manufacturing specifications were secure while organizational infrastructure was put in place and maintained to NIST Compliance.

Contact Us For Support

Name(Required)
This field is for validation purposes and should be left unchanged.

Trusted By Organizations Across The Country

Logo for Allstate. Logo for Altrua Global Solutions. Logo for Church of the Redeemer. Logo for Coastal Resources. Logo for DDA Ann Arbor. Logo for Del Zotto Products. Logo for Deleon Appraisals. Logo for Fogelman. Logo for Indratech. Logo for Lynden School District. Logo for N Street Village. Logo for Ocala Metro CEP. Logo for SecurTrust. Logo for Society of American Military Engineers. Logo for Sunshine Air Conditioning. Logo for The Federalist Society. Logo for United Way of Marion County. Logo for Westfields Golf Club. Logo for Andgar Corporation.

Need More From Your IT Services Provider?

ITonDemand is a division of eResources: your expert partner in digital transformation and growth, providing IT services, software development, marketing and branding.  Learn more about the benefits of a vertically-integrated IT services partner.