By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: Five Questions to Ask Your Business Associates: #3 Policies & Technologies
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > Uncategorized > Five Questions to Ask Your Business Associates: #3 Policies & Technologies
Uncategorized

Five Questions to Ask Your Business Associates: #3 Policies & Technologies

onlinetech
onlinetech
Share
4 Min Read
SHARE

Our third most important question to a Business Associate is:

What policies and technologies are used to protect my applications and PHI data?

Our third most important question to a Business Associate is:

What policies and technologies are used to protect my applications and PHI data?

Neither HIPAA nor HITECH call for specific technical measures to assure PHI data is available, accurate and secure. However, there are still basic technologies and practices that indicate a culture of security awareness and proficiency. After you review the BA’s independent HIPAA audit report, ask about these data security technologies.

In our case, as a hosting provider, the minimum server security requirements to meet HIPAA compliance are:

  • Virtual or Dedicated Firewall
  • Backup
  • Antivirus
  • OS Patch Management

We also recommend:

  • Private Firewall services (either a Virtual or Dedicated Firewall) with VPN for remote access
  • Separate database and web servers for production
  • Separate test server (can use one for web and DB but not same as production)
  • Offsite data backup at the minimum, ideally a warm-site disaster recovery paradigm (easiest for cloud servers)
  • SSL certificates and HTTPS for all web-based access to PHI (protected health information)
  • Private IP addresses

Is encryption required?
We are asked this repeatedly, and the answer is “No, but it’s a darn good idea.” Encryption is usually handled at the software application level, so if you are working with a Business Associate who is providing software, ask how they address it in the application. If you are putting your own software on a server, you’ll undoubtedly have taken encryption into account. Encryption requires decryption prior to use which is computationally expensive, so you can’t just encrypt everything on the server. The best tools and methods depend on the application, operating system and usage patterns. Look for the following best practices:

  • Always use SSL for web-based access of any sensitive data (personally identifying or medical information)
  • Name, SSN, diagnosis, addresses, prognosis etc. and other sensitive information within an EMR (electronic medical records) system should be encrypted in the database using techniques and mechanisms known only to a select few.
  • Content such as images or scans should be encrypted and contain no personally identifying information.

Important HIPAA policies to ask about:

  • Documentation of data management, security, training and notification plans (every employee should have regular HIPAA security training)
  • Clients should use a password policy for their access
  • Encrypt PHI data whether it’s in a database or in files on the server
  • Do not use public FTP (File Transfer Protocol) to move files
  • Only use VPN (virtual private network) access for remote access
  • Login retry protection in their application
  • Documentation of a DR (disaster recovery) plan

Next week, we’ll talk about important questions to ask about disaster preparedness and how long it will take for you to access your PHI again in the event disaster strikes.

Are you going to HIMSS 12 in Las Vegas, Feb. 20-24? If so, stop by our Booth (#13528) and say hello! Online Tech will be exhibiting at HIMSS with our HIPAA compliant hosting solutions for healthcare and related organizations.

References:
HIPAA FAQ
What Services From Online Tech Help Make Me Compliant?
Encrypting Data to Meet HIPAA Compliance
SearchHealthIT: How to Comply With the HIPAA Security Rule
More HIPAA Resources

For HIPAA Compliant hosting, call 877.740.5028 or email contactus@onlinetech.com

  

TAGGED:HIPAA
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5kFollowersLike
4.5kFollowersFollow
2.8kFollowersPin
136kSubscribersSubscribe

Latest News

file a police report after a car accident
Can Filing a Police Report Help with Medical Bills?
Policy & Law
November 2, 2025
Slips and falls can happen in the blink of an eye, often in spaces we believe to be safe. A brief moment of misstep
When a Simple Fall Becomes a Serious Health Concern
Health
November 1, 2025
How Setting Boundaries Helps Trauma Survivors Heal
Health
October 30, 2025
how to improve REM sleep
Unlock Better Sleep: How to Improve REM Sleep Naturally
Wellness
October 30, 2025

You Might also Like

HIPAA Enforcement: Who’s in Charge?

February 3, 2014
BusinessHealth careHospital AdministrationMarketingMedical EducationMedical InnovationsMedical RecordsTechnologyUncategorized

The Importance Of Medical Labels And Supplement Labels

February 4, 2020
HIPAA-Compliance.png
BusinessPolicy & Law

OCR Just Finalized its Audit Protocols – Are You Feeling Confident About Your HIPAA Compliance?

May 5, 2016

HIMSS Healthcare IT Awareness Week Activities and Agendas

September 12, 2011
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?