Question

In: Operations Management

What are the HIPPAA regulations & criteria for software application that contains PHI of user?

What are the HIPPAA regulations & criteria for software application that contains PHI of

user?

Solutions

Expert Solution

HIPAA, stands for the Health Insurance Portability and Accountability Act of 1996, which is US legislation that sets data privacy and security provisions for safeguarding and protecting medical information like medical records and other identifiable health datas.

Protected health information (PHI)  may be defined as any data that can be used for identifying a patient.

PHI consists of two parts: health information and personal identifiers.

HIPPAA regulations & criteria for software application that contains PHI of users are:

1. Access control

Any system that stores PHI should have a  limit that  who all can view or modify the sensitive data. As per HIPPAA Privacy policy, no person should see more patient information than for  their job. This rule also specifies de-identification, patient’s rights to view their own data and their ability to give or restrict the access to their PHI.

2. Person or entity authentication

Once you’ve assigned privileges, your system should be able to verify that the person trying to access PHI is the one that he/she claims to be. The law provides several general ways in which you can implement this safeguard:

  • Biometrics (e.g.fingerprint, voice etc)
  • Password;
  • Physical means of identification (e.g. a key, card, or a token);
  • Personal Identification Number (PIN).

3. Transmission security

One should protect the PHI you send over the network and between the different tiers of the system.

4. Encryption/decryption

Encryption is the best possible mean for ensuring PHI integrity. Even if hackers managed to steal your data, it’d look like a gibberish without the decryption keys.

Unencrypted laptops or any other portable devices are a common source of HIPAA breaches. To be safe, it is recommended to encrypt the hard drives of all devices that contain PHI.

5. PHI disposal

One is dull to permanently destroy PHI when no longer needed. As long as its copy remains in one of your backups, the data isn’t considered as  “disposed of”.

6. Data backup and storage

Backups are essential for data integrity. A database corruption or a server crash could easily damage your PHI. Hence it’s  better to have multiple copies of your PHI stored in various different locations.

8. Automatic logoff

A system with PHI should  be in a way that it automatically terminate any session after a set period of inactivity. To continue, the user would have to re-enter the  password or authorize in some other way. This would helps in protecting PHI if someone loses his/her device while logged into the app.

If you liked the answer, please Up Vote. Thank you!


Related Solutions

You learned about PHI, HIPAA, policies and procedures, international regulations etc. 1. Discuss international regulations and...
You learned about PHI, HIPAA, policies and procedures, international regulations etc. 1. Discuss international regulations and control. 2. How cloud computing is going to affect rules and regulations? Discuss one or two concerns you have using the cloud services.
What is the difference between the application of Teamcenter and Technomatix software?
What is the difference between the application of Teamcenter and Technomatix software?
Besides the software itself, what are the basic components of a public health GIS application
Besides the software itself, what are the basic components of a public health GIS application
Write application in C# that enables a user to: Use Methods for user input and calculations...
Write application in C# that enables a user to: Use Methods for user input and calculations input the grade and number of credit hours for any number of courses. Calculate the GPA on a 4.0 scale using those values. Grade point average (GPA) is calculated by dividing the total amount of grade points earned, sometimes referred to as quality points, by the total number of credit hours attempted. For each hour, an A receives 4 grade or quality points, a...
Create an application that makes the user guess a number. The user must be allowed tries....
Create an application that makes the user guess a number. The user must be allowed tries. You must have a loop, user input (Scanner), and a constructor. (JAVA)
2.When is Phi appropriate? 3.When Cramer’s V appropriate? 4.What values can phi take on?
2.When is Phi appropriate? 3.When Cramer’s V appropriate? 4.What values can phi take on?
1). What is the difference between system and application software ? Give a real life example.
1). What is the difference between system and application software ? Give a real life example.
The first step in writing a software application is to determine the requirements. There is no...
The first step in writing a software application is to determine the requirements. There is no value in writing a program that does not address the needs of the client. Requirements can be gathered in many ways, but ultimately, the requirements serve to document what the application should and should not do. After the requirements are written, the application design can be prepared, followed by the actual coding. For this project, you will gain some practice in the design phase...
Create an application that allows the user to enter the total for an order and the...
Create an application that allows the user to enter the total for an order and the name of the customer. If the order is less than 500 dollars, the customer gets no discount. If the order is greater than or equal to 500 and less than 1000 dollars, the customer gets a 5 percent discount. If the order is greater than or equal to 1000 dollars, the customer gets a 10 percent discount. The application should display the name of...
Your software development company wants to continue developing and enhancing a software application for internal use....
Your software development company wants to continue developing and enhancing a software application for internal use. For this week's assignment, the application is required to read from a file (data.txt) containing employee data. Your tasks include: Use the data file from Week One (data.txt) Implement LINQ functionalities to search, display, and modify employees' records Meet specifications by displaying on a Windows Form Application Program Input File: Using Visual Studio and C# programming concepts and using your Week one data.txt file...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT