Search
Recommended Sites
Related Links






Valid XHTML 1.0 Transitional

Valid CSS!
   

Informative Articles

ERP Software Leader Encompix Creates Library of Modifications
The Mods Store is a library of modifications Encompix has developed for its customers over the years. The Store likely contains modifications developed for another customer that would be useful to other ETO (Engineer-to-Order) ERP (Enterprise...

gomembers' software modifications provide the energy behind Society of Petroleum Engineers
[Herndon, VA] gomembers, Inc., (http://www.gomembers.com) announced that the Society of Petroleum Engineers (SPE: http://www.spe.org/spe/jsp/homepage) has elected to have gomembers engineer modifications to their gomembers' association+® software...

Renew And Update Your Antivirus Software Today
PC users are facing new computer viruses every day. Computer viruses not only affect home PCs, they clog up internet traffic and disrupt the business of big corporations, causing billion dollars worth of damage each year. To protect your computer...

Tech Heads Need to Build Software for the Average Human
Being the total opposite to a technical person, it is hard to imagine future Internet software advances. The techno-humans have come up with incredible ideas and subsequently their ideas have come to fruition. It seems like anything a human puts...

The Best Simple Software For The Busy Webmaster
Here are a few programs I can't do without. They're free, and make being a webmaster much easier. CGI-Telnet http://www.rohitab.com/cgiscripts/cgitelnet.html A cgi script that allows you to run commands on your server, even if your web host...

 
HIPAA: Requirements For Intranet Collaboration Software


Sharing private health information over the internet can be a risky business. Unfortunately, as people become accustomed to doing most if not all of their personal business online, the demand for accessing this information online will grow to the point that health care providers will have no choice but to either provide access to this private health information or lose their customers.

The Health Insurance Portability and Accountability Act (HIPAA) was enacted to assure the confidentiality of patient information. This requires that health care providers employ stringent measures to assure that information shared on the internet is protected from unauthorized access.

The HIPAA Act requires health-providing entities to:

• Assign responsibility for security to a person or organization.

• Assess security risks and determine the major threats to the security and privacy of protected health information.

• Establish a program to address physical security, personnel security, technical security controls, and security incident response and disaster recovery.

• Certify the effectiveness of security controls.

• Develop policies, procedures and guidelines for use of personal computing devices (workstations, laptops, hand-held devices), and for ensuring mechanisms are in place that allow, restrict and terminate access (access control lists, user accounts, etc.) appropriate to an individual's status, change of status or termination.

• Implement access controls that may include encryption, context-based access, role-based access, or user-based access; audit control mechanisms, data authentication, and entity authentication

This law has serious implications for organizations that allow unauthorized access resulting in a breach in confidentiality.

Security is the key

Since the HIPAA law provides for both civil and criminal penalties for violations, data and access security is of the utmost importance. To assure HIPPA compliance, online document management on company intranets and extranets must include a number of security features:

• Secure web server – a server running secure socket layers is the minimum needed.

• Encrypted database – all data must be encrypted. Software is available that will encrypted all data sent between two computer over the internet.

• Secure access control -- in addition to a traditional user id and password, it may be a good idea to use a strong password or smart card as additional security.

• Session timeout – this assures that confidential data is not left on an unattended screen.

• Server monitoring – the secure web server needs to be strictly monitored to detect break-in attempts.

• Regular security audits – regular audits are required to make sure all security precautions are working properly.

• Personnel – system maintenance should be in the hands of qualified personnel familiar with HIPPA requirements



About the Author:

Laura Schweiker writes extensively on the use of technology by businesspeople and is an evangelist for online collaboration and intranet solutions.

Source: www.isnare.com

Sign up for PayPal and start accepting credit card payments instantly.