Healthcare compliances training and discussion blog


Secure Computer networks are intrinsic part of the HIPAA strategy to completely convert the national patent health records into an electronic format that can be easily exchanged between different agencies like health care providers, insurance providers, and administrators. As a result the health care organizations can manage documentation process efficiently in minimal time and provide better service to the patients. But the present day computer system is prone to hacking and virus attacks, which steal or destroy the crucial data. To protect the patient health information there are network security rules that need to be followed so that the organization is able to achieve HIPAA compliance.

There are two main sections of HIPAA that relate to computer network security and they are:

Administrative Safeguards:

To achieve HIPAA compliance, it necessary for the provider to identify, guard and report against malicious software program in the system. The infected email carry with them worms, virus and Trojans and there should be a security system in place that checks for such unwanted entry. To manage the computer networks smoothly, it is necessary to maintain a vigil by installing special safeguards mentioned below:

  • Gateway and desktop anti–virus products should be used.
  • The security gateway should be able carry out, deep-packet-penetration, inspection and provide appropriate web filtering capabilities to the network.
  • Signature files that update at every 30 minutes should be used, as they are best form of defense against the fast moving worms.
  • All the security services and subsystem should be proactive with IPS (Intrusion Protection System) instead of IDS (Intrusion Detection System). This is necessary to protect the network from being infected with virus.
  • The installed firewall should provide protection from the top 50 Dos and DDos well known attacks. The installed security system should register the number time the attacks have been made and counter them effectively.

Security Safeguards:

For a computer network to attain HIPAA compliance it is necessary for the organization to frame security policy that make it mandatory for only the authorized personnel or software programs to have the access rights to protected health information.

  • The security device should support native form of authentication. For web related applications, Transparent Authentication should be used so that a same user who moves to different secure applications does not have to sign-in, his or her, username and password, every time he or she makes a jump.
  • The security system should support email content filtration process with keywords and regular expression string features.
  • To prevent, unauthorized access or intercept, of the patient health information when it on journey between sender and receiver, proper encryption techniques should be used. The transport of the PHI to public network should be done in strong encryption mode and received by authenticated users, who should have the requisite deciphering codes.
  • The security system should continuously monitor for any unwanted or suspicious deviation from the standard procedure and report anomalous activity immediately to IT manager.
  • Special security features like email content filtering application and digital signatures should be added in the system to prohibit dispatch of safe data to unverified receivers.

In the end it is necessary for all the entities that are involved in health care system like, health service providers, insurance companies, transcription service providers, payers, labs, internet service providers, hospitals and billing services to build a chain of trust so that any patient health information routed between them is kept high confidential. This can be done through a network of computer systems that strictly adhere to HIPAA compliance norms to facilitate a safe and secure transmission of confidential health information on public network.

Highly secure computer network is essential for exchange and storage of patient health information as per HIPAA norms.

Jason Gaya

Read more about HIPAA compliance at,www.empowerbpo.com

Advertisements

Comments on: "Enhancing Computer Network Security to Achieve HIPAA Compliance" (7)

  1. Pooja Miller said:

    Dear Jason,

    Hi,

    Thanks for the informative article and I am interested to know more about the role of HIPAA in patient health records.Any more articles on HIPAA will be appreciated.

    Regards,
    Pooja Miller

  2. Pretty good post. I just stumbled upon your blog and wanted to say that I have really enjoyed reading your blog posts. Any way I’ll be subscribing to your feed and I hope you post again soon.

  3. Hi, it looks like your site

  4. Could I use this article on my website? I will provide FULL credit to the author.

  5. Its great and knowledgeable site but if u want to know what In a complex world of Information Technology and “technology upheavals”, enterprises feel the need for aligning their business objectives with security for optimizing profits. The threat of information collapse for enterprises and ultimately the much intertwined destiny of survival are at stake. TechnoTera.Com offers enterprises a strategic mix of information security consulting services, web and programming solutions. Subscribing to TechnoTera.Com services platform is the difference between enterprise success and failure, innovation and mediocrity, security and threat, entity and non-entity, progression and regression, education and ignorance.for more information about network security, information security, internet security, firewall, IT security, penetration testing, hacking penetration testing, , software security, system security, internet security just visit http://www.technotera.com.

  6. I usually don’t post on Blogs but ya forced me to, great info.. excellent! … I’ll add a backlink and bookmark your site.

    Robert Shumake Fifth Third

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Tag Cloud

%d bloggers like this: