Patient Privacy
Information about Patient Privacy
What is Patient Privacy?
HIPAA sets forth the standard for ensuring patient privacy, and the
protection of sensitive patient data. Any company that deals
with protected health information (PHI) must ensure that all the
required physical, network, and process security measures are in place
and strictly followed. The HIPAA Privacy Rule provides guidelines for
individuals and organizations: physicians, nursing homes, health
insurance companies, Medicare.
The HIPAA Security Rule defines the requirements to continuously secure
electronic protected health information (EPHI) as it moves through the
healthcare system. Healthcare organizations, including providers,
payers, and clearinghouses must protect EPHI. InfoSight Managed Network
Security solutions enforce administrative procedures, technical security
mechanisms, services, and physical safeguards to ensure compliance with
the HIPAA Patient Privacy rules.
InfoSight will host your data, as we are a compliant hosting
provider, with administrative, physical and technical patient
privacy safeguards
in place, and in accordance with the U.S. Department of Health and Human Services
standards.
The physical and technical safeguards are relevant to services
provided by our HIPAA compliant hosting; they are Physical and
Technical safeguards for patient privacy, Audit reports, Technical
policies, Network, or transmission, the elements of a HIPAA compliant Data
Center.
A Supplemental Act was passed in 2009; The Health Information
Technology for Economic and Clinical Health Act (HITECH), which supports
the enforcement of HIPAA requirements, by raising the penalties of health
organizations that violate HIPAA Patient Privacy and Security Rules. The HITECH
Act responds to patient privacy needs, health technology development, and
increased use, storage, and transmittal of electronic health information.
If you would like more information regarding Patient Privacy, contact
us today to discuss your requirements.
Complementary Services
Vulnerability Assessment
IT Risk Assessment
Social Engineering Testing and Training