Patient Privacy

Information about Patient Privacy

What is Patient Privacy?
 
HIPAA sets forth the standard for ensuring patient privacy, and the protection of sensitive patient data. Any company that deals with protected health information (PHI) must ensure that all the required physical, network, and process security measures are in place and strictly followed. The HIPAA Privacy Rule provides guidelines for individuals and organizations: physicians, nursing homes, health insurance companies, Medicare.

The HIPAA Security Rule defines the requirements to continuously secure electronic protected health information (EPHI) as it moves through the healthcare system. Healthcare organizations, including providers, payers, and clearinghouses must protect EPHI. InfoSight Managed Network Security solutions enforce administrative procedures, technical security mechanisms, services, and physical safeguards to ensure compliance with the HIPAA Patient Privacy rules.

InfoSight will host your data, as we are a compliant hosting provider, with administrative, physical and technical patient privacy safeguards in place, and in accordance with the U.S. Department of Health and Human Services standards. The physical and technical safeguards are relevant to services provided by our HIPAA compliant hosting; they are Physical and Technical safeguards for patient privacy, Audit reports, Technical policies, Network, or transmission, the elements of a HIPAA compliant Data Center.

A Supplemental Act was passed in 2009; The Health Information Technology for Economic and Clinical Health Act (HITECH), which supports the enforcement of HIPAA requirements, by raising the penalties of health organizations that violate HIPAA Patient Privacy and Security Rules. The HITECH Act responds to patient privacy needs, health technology development, and increased use, storage, and transmittal of electronic health information.

If you would like more information regarding Patient Privacy, contact us today to discuss your requirements.

Complementary Services
Vulnerability Assessment
IT Risk Assessment
Social Engineering Testing and Training