|
|
Services: Roadmap to HIPAA Security Compliance
In 1996, Congress wrote the Health Insurance Portability and Accountability Act to define a set of
standard electronic transactions within an interface environment. One of the requirements of this act
is a set of broad reaching security requirements that affect every healthcare provider, data warehouse,
or health maintenance organization, including a stiff civil monetary and imprisonment penalty for
improperly secured or released personal health information.
The recent policies presented by the US Department of Health and Human Services, in accordance with
the Health Insurance Portability and Accountability Act of 1996, make protecting your patient�s
private information a critical requirement of your interface environment. Unfortunately, many health
organizations do not have the security expertise to implement a comprehensive secure environment
without external assessment.
Interprise Security Group, Inc., has developed a process to assess an organization�s compliance with
the proposed HIPAA security requirements. This assessment is tailored specifically for detecting
vulnerabilities inherent in an integrated systems environment, which may bring an extensive set of
weaknesses to the security of your network. Our intimate knowledge of interface leveraged with our
security expertise has allowed us to develop a focused assessment plan specifically for these
environments.
Key Benefits
- Assessment tailored to an integration environment
- Identifies vulnerabilities specific to interface engines and applications.
- Assesses security impact of integration environment on entire corporate enterprise.
- Provides a comprehensive set of recommendations to aid HIPAA security compliance.
Capabilities
Interface Vulnerability Analysis:
An extensive probe of your interface engine with a focus on denial of service and data snooping
vulerabilities.
Critical Path Vulnerability Analysis:
Every system on the shortest path from the internet to your interface engine will be assessed for
vulnerabilities.
Data Privacy and Protection Assessment:
Analysis of privacy and protection electronic procedures and policies.
Information Request Form
|
© 2000 Interprise Security Group, Inc.
Please direct questions/comments about this site to WebKeeper
|
|
|
|