Wednesday, June 24, 2009

It notes

BIOTECH / BIOINFORMATICS COMPLIANCES BY InfoTech

pumpkin

HIPAA - The Health Insurance Portability and Accountability Act of 1996
HIPPA-INFO.com - Information on HIPAA

bg image

›› HIPAA and Information Technology

img/hipaa.jpgThe complexities of The Health Insurance Portability and Accountability Act of 1996 (HIPAA) framework of rules and regulations together with the stringent security and privacy requirements, has made Information technology the hero of HIPAA compliance. Without the Information technology getting involved in HIPAA compliances, ensuring compliance to HIPAA would be Impossible. For ensuring the privacy and security of patient data, IT has come forward with HIPAA complaint software which employ highly complex digital encryption technologies normally never used in business environment to provide military grade security to the data.

Technological advancements like EDI (electronic data interchange) has provided so much convenience to the service providers who can now submit their claims to the insurers through EDI and even receive payments directly into their banks. All major hospitals and health care provided have medical records of their patient s stored in electronic format. How HIPAA requires that these systems which handle the patients records must comply with the HIPAA security and privacy regulations. Here comes the HIPAA compliant EMR or the electronic medical records software which keeps all the patient histories in digital format accessible to all relevant and authorized persons as per the guide lines of HIPAA. Even four after the HIPAA has come into force; only seven percent of the Hospitals have HIPAA compliant EMR.

At the time when The Health Insurance Portability and Accountability Act of 1996 (HIPAA) came into force the technology was not so advanced. All it provided was for the use of EDI and data security guaranteeing privacy of the patient’s data and provisioning of a regulatory framework for the management of a patient’s data. After a decade of HIPAA compliance we can look ford to web enabling HIPAA covered entities so that the patient need not even visit the medical office for verifying his own data.





Copyright © 2005 (HIPAA-INFO.com)

ISO/IEC 10918-2:1995

Information technology -- Digital compression and coding of continuous-tone still images: Compliance testing

ISO/IEC 10918-4:1999

Information technology -- Digital compression and coding of continuous-tone still images: Registration of JPEG profiles, SPIFF profiles, SPIFF tags, SPIFF colour spaces, APPn markers, SPIFF compression types and Registration Authorities (REGAUT)



Security Assessment

Vulnerability Management

Risk Management

Compliance Management

Codescan

Website Security

Compliances & Best Practices Readiness Reviews

Back to What We Do

Compliances & Best Practices

Compliances & Best Practices Readiness Reviews

Compliance and practice standards investigation is a crucial factor in any successful business security plan. Security Assessment Inc will assist businesses in every step of their compliance works.


Basel II

  • formulates broad supervisory standards and guidelines and recommends statements of best practice in the expectation that individual authorities will take steps to implement them through detailed arrangements


COBIT

  • a standard for good Information Technology (IT) security and control practices.


COSO

  • an independent private sector initiative which studied the causal factors that can lead to fraudulent financial reporting and developed recommendations for public companies and their independent auditors.


Bill-198

  • companies trading on the Canadian or American stock exchange, requires management file an internal control report with its annual report.


HIPAA

  • an act to ensure that customers are able to switch between health insurance providers as smoothly as possible without the unavailability, total loss or loss of integrity within their health data.


ISO 17799, BS7799

  • A comprehensive set of controls comprising best practices in information security.


ISO 27799

  • A security management in health using ISO/IEC 17799.


NIST

  • a non-regulatory federal agency within the U.S. to develop and promote measurement, standards, and technology to enhance productivity, facilitate trade, and improve the quality of life.


NSA

  • coordinates, directs, and performs highly specialized activities to protect U.S. government information systems and produce foreign signals intelligence information.


PHIPA

  • A set of regulations that allows the freedom of information and the protection of privacy.


PIPEDA

  • An Act to support and promote electronic commerce by protecting personal information that is collected, used or disclosed in certain circumstances.


Sarbanes Oxley (SOX)

  • A violation of Rules of the Public Company Accounting Oversight Board is treated as a violation of the '34 Act, giving rise to the same penalties that may be imposed for violations of that Act.


SANS

  • develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - Internet Storm Center.

Contact Us to book your free no obligation appointment and review how our services can benefit your business in detail.

Copyright 2005, Security Assessment Inc.TM All rights reserved.

No comments:

Post a Comment