Services: Roadmap to HIPAA Security Compliance


In 1996, Congress wrote the Health Insurance Portability and Accountability Act to define a set of standard electronic transactions within an interface environment. One of the requirements of this act is a set of broad reaching security requirements that affect every healthcare provider, data warehouse, or health maintenance organization, including a stiff civil monetary and imprisonment penalty for improperly secured or released personal health information.

The recent policies presented by the US Department of Health and Human Services, in accordance with the Health Insurance Portability and Accountability Act of 1996, make protecting your patient�s private information a critical requirement of your interface environment. Unfortunately, many health organizations do not have the security expertise to implement a comprehensive secure environment without external assessment.

Interprise Security Group, Inc., has developed a process to assess an organization�s compliance with the proposed HIPAA security requirements. This assessment is tailored specifically for detecting vulnerabilities inherent in an integrated systems environment, which may bring an extensive set of weaknesses to the security of your network. Our intimate knowledge of interface leveraged with our security expertise has allowed us to develop a focused assessment plan specifically for these environments.



Key Benefits
  • Assessment tailored to an integration environment
  • Identifies vulnerabilities specific to interface engines and applications.
  • Assesses security impact of integration environment on entire corporate enterprise.
  • Provides a comprehensive set of recommendations to aid HIPAA security compliance.



Capabilities

Interface Vulnerability Analysis:
An extensive probe of your interface engine with a focus on denial of service and data snooping vulerabilities.

Critical Path Vulnerability Analysis:
Every system on the shortest path from the internet to your interface engine will be assessed for vulnerabilities.

Data Privacy and Protection Assessment:
Analysis of privacy and protection electronic procedures and policies.



Information Request Form

Send service literature
Send company literature
Have a salesperson contact
Name:
Title:
Company:
Address:
Email:
Phone:




© 2000 Interprise Security Group, Inc.
Please direct questions/comments about this site to WebKeeper