a

HIPAA Compliance in the Cloud

Joel Garcia Joel Garcia has been building AllCode since 2015. He’s an innovative, hands-on executive with a proven record of designing, developing, and operating Software-as-a-Service (SaaS), mobile, and desktop solutions. Joel has expertise in HealthTech, VoIP, and cloud-based solutions. Joel has experience scaling multiple start-ups for successful exits to IMS Health and Golden Gate Capital, […]

HIPAA Compliance for digital health startups is important.

In this blog post, we’ll define HIPAA, PHI, and HIPAA Compliance. We’ll then provide practical examples of PHI. We will specify some steps that need to be taken to secure PHI in a cloud environment. We’ll then begin to discuss some of the 3rd party vendors that offer different compliance solution.
The HIPAA Privacy Rule protects most “individually identifiable health information” held or transmitted by a covered entity or its business associate, in any form or medium, whether electronic, on paper, or oral. The Privacy Rule calls this information protected health information (PHI)2.
Practical examples of PHI are

  • Patient names
  • Addresses — In particular, anything more specific than state, including street address, city, county, precinct, and in most cases zip code, and their equivalent geocodes.
  • Dates — Including birth, discharge, admittance, and death dates.
  • Telephone and fax numbers
  • Email addresses
  • Social Security numbers
  • Driver’s License information
  • Medical record numbers
  • Account numbers
  • Health plan beneficiary numbers
  • Certification/license numbers
  • Vehicle identifiers and serial numbers, including license plate numbers
  • Device identifiers and serial numbers
  • Names of relatives
  • Internet Protocol (IP) address numbers
  • Biometric identifiers — including finger and voice prints.
  • Full face photographic images and any comparable images.

When your cloud application makes use of PHI, then your cloud application must take additional security steps to protect the PHI. These steps include:

  • Managing encryption at rest and in transit.
  • Encrypting database backups
  • Centralized Access Control system to audit who has access to the the PHI

There is a also a compliance angle to HIPAA. You can tell a vendor that you are compliant, but how do you prove it? In order to demonstrate HIPAA Compliance. You will invariably need to sign a Business Associate Agreement (BAA). The BAA will attest that the PHI provided to you will be protected, audited, used by professionals are educated on PHI, and have documented processes. You will need the following:

  • Automated Risk Assessment
  • Policy Procedures
  • Training for your workforce.
  • Incident Response Tool - Policy in place.
  • Intrusion detection software.

There are a number of different options in the cloud:
Aptible -  https://www.aptible.com - HIPAA Compliant Docker Container Solution
TrueVault - https://www.truevault.com - HIPAA Compliant Secure API to Store Health Data.
ClearDATA - https://www.cleardata.com - Healthcare Management Platform that resides on AWS.
AWS Snowball - https://aws.amazon.com/snowball/ - AWS Snowball enables you to to transfer large amounts of data, including Protected Health Information, into and out of the AWS Cloud in a secure and cost-effective manner

Joel Garcia
Joel Garcia

Joel Garcia has been building AllCode since 2015. He’s an innovative, hands-on executive with a proven record of designing, developing, and operating Software-as-a-Service (SaaS), mobile, and desktop solutions. Joel has expertise in HealthTech, VoIP, and cloud-based solutions. Joel has experience scaling multiple start-ups for successful exits to IMS Health and Golden Gate Capital, as well as working at mature, industry-leading software companies. He’s held executive engineering positions in San Francisco at TidalWave, LittleCast, Self Health Network, LiveVox acquired by Golden Gate Capital, and Med-Vantage acquired by IMS Health.

Related Articles

AWS Graviton and Arm-architecture Processors

AWS Graviton and Arm-architecture Processors

AWS launched its new batch of Arm-based processors in 2018 with AWS Graviton. It is a series of server processors designed for Amazon EC2 virtual machines. The EC2 AI instances support web servers, caching fleets, distributed data centers, and containerized microservices. Arm architecture is gradually being rolled out to handle enterprise-grade utilities at scale. Graviton instances are popular for handling intense workloads in the cloud.

What is Tiered Pricing for Software as a Service?

What is Tiered Pricing for Software as a Service?

Tiered Pricing is a method used by many companies with subscription models. SaaS companies typically offer tiered pricing plans with different services and benefits at each price point with typically increasing benefits the more a customer pays. Striking a balance between what good rates are and the price can be difficult at times.

The Most Popular Cloud Cost Optimization Tools

The Most Popular Cloud Cost Optimization Tools

Cloud environments and their pricing models can be difficult to control. Cloud computing does not offer the best visibility and it is easy to lose track of which price control factors are having an impact on your budget. Having the right tools can help put value to parts of an environment and provide guides on how to better bring budgetary issues back under control.