Hipaa Compliance

education

HIPAA Compliance

Any organization that transmits electronic protected health information, known as ePHI, must comply with Health Insurance Portability and Accountability Act (HIPAA). This act centers around protecting the security and privacy of critical patient data. SQ1Shield can help you respond to the regulation’s guiding principles of confidentiality, integrity and availability of ePHI.

Be Secure. Be Compliant.

Customized assessments for Covered Entities and Business Associates to identify safeguard necessary to meet HIPAA Compliance

Locate gaps that exist between your current security posture and the requirements

SQ1Shield helps you confront your HIPAA compliance gaps so that risks can be prioritized and addressed

SQ1Shield built-in HIPAA reports help you report easily on security controls

Customize the reports to meet your business requirements and stay Compliant

SQ1Shield & HIPAA Compliance – Fulfil Compliance requirement with SQ1Shield

HIPAA Standard HIPAA Requirement SQ1Shield Coverage

164.308(a)(1)(i) - Security Management Process - Implement policies and procedures to prevent detect contain and correct security violations.

164.308(a)(1)(ii)(A) – Risk Analysis

Risk Management – SQ1Shield helps you perform Risk assessment, prioritize risks, remediate and generate reports

164.308(a)(1)(ii)(B) – Risk Management

Risk Management Dashboard helps you assess, monitor and manage risk continuously

164.308(a)(1)(ii)(C) – Sanctions Policy

Policy Management helps you establish policies, update it and circulate within your employees

164.308(a)(1)(ii)(D) - Information System Activity Review

Vulnerability Management – Identify vulnerabilities within the network and rank them

Identify disabled security tools like Anti-Virus, Firewalls etc.

Monitor & alert configuration changes within your network

Monitor user access to your cloud environment such as Azure, AWS, GCloud etc.

Capture, analyze logs captured from various devices within your network (on-premise & cloud)

164.308(a)(3)(i) – Workforce Security - Implement policies and procedures to ensure that all members of its workforce have appropriate access to electronic protected health information

164.308(a)(3)(ii)(A) - Authorization and/or Supervision

Monitor access attempts to critical files and data, and alarm when unauthorized attempts are detected

Capture and monitor login success & failures

164.308(a)(3)(ii)(C) – Termination Procedures

Monitor & alert logon of de-provisioned users

164.308(a)(4)(i) - Information Access Management - Implement policies and procedures for authorizing access to electronic protected health information

164.308(a)(4)(ii)(C) – Access Establishment and Modification

Capture creation of user accounts and modifications thereon. Alerts privilege escalation attempts

164.308(a)(5)(i) - Security Awareness Training - Implement a security awareness and training program for all members of its workforce

164.308(a)(5)(ii)(A) – Security Reminders

Automated updates of threat intelligence and security awareness shared through policy management portal

164.308(a)(5)(ii)(B) - Protection from Malicious Software

Identifies systems with vulnerabilities that may be susceptible to attacks

164.308(a)(5)(ii)(C) - Log-in Monitoring

Captures all log-in successful and failure attempts

164.308(a)(5)(ii)(D) - Password Management

Captures and monitors any password changes and expiry

164.308(a)(6)(i) – Security Incident Procedure

164.308(a)(6)(ii) – Response and Reporting

Automated Incident Response – Correlates events to detect threats.

Security orchestration and automated response capabilities enable rapid response to incidents.

Automated ticket generation and integration with other tools ensures guided threat response. Captures and monitors any password changes and expiry

164.308(a)(7)(i) – Contingency Plan - Establish (and implement as needed) policies and procedures for responding to an emergency or other occurrence (for example fire vandalism system failure and natural disaster) that damages systems that contain electronic protected health information.

164.308(a)(7)(i) – Contingency Plan

Review the contingency plan in place and recommend remedial measures

164.308(a)(7)(ii)(A) – Data backup Plan

Review and test the Data backup and recommend remedial measures

164.308(a)(7)(ii)(B) - Disaster-Recovery Plan

Review the Disaster Recovery Plan in place and recommend remedial measures

164.308(a)(7)(ii)(D) – Testing and Revision Procedures

Test the contingency, Disaster Recovery Plan in place and recommend remedial measures

164.308(a)(7)(ii)(E) - Applications and Data Criticality Analysis

SQ1Shield provides fault resilient architecture that ensures durability of all data captured.

164.308(b)(1) - Business Associate Contracts and Other Arrangements - Business associate contracts and other arrangements. A covered entity in accordance with § 164.306 may permit a business associate to create receive maintain or transmit electronic protected health information on the covered entity s behalf only if the covered entity obtains satisfactory assurances in accordance with § 164.314(a) that the business associate will appropriately safeguard the information.

164.308(b)(1) - Business Associate Contracts and Other Arrangements

Vendor Risk Management – Perform third party risk assessment and monitor the risks in third party that have access ePHI.

Perform vulnerability assessment on Vendor Network and remediate.

164.310(a)(1) – Facility Access Controls - Implement policies and procedures to limit physical access to its electronic information systems and the facility or facilities in which they are housed while ensuring that properly authorized access is allowed.

164.310(a)(1) – Facility Access Controls

Identify perimeter access control logs and assess device for configuration

164.310(b) - Workstation Use - Implement policies and procedures that specify the proper functions to be performed the manner in which those functions are to be performed and the physical attributes of the surroundings of a specific workstation or class of workstation that can access electronic protected health information.

164.310(b) - Workstation Security

Endpoint Detection and Response – Secure all workstations

164.310(b) - Workstation Use - Implement policies and procedures that specify the

164.310(b) - Workstation Security

Endpoint Detection and Response – Secure all workstations

164.310(d)(1) - Device and Media Controls - Implement policies and procedures that govern the receipt and removal of hardware and electronic media that contain electronic protected health information into and out of a facility and the movement of these items within the facility.

164.310(d)(2)(iv) – Data Backup and Storage

Test and review backup data and report

164.312(a)(1) – Access Control - Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been granted access rights

164.312(a)(2)(iii) - Automatic Logoff

Monitor changes to Windows Group Policy and Office 365 policies that define automated logoff, session timeout, and access token timeout parameters.

164.312(a)(1) – Access Control - Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been granted access rights

164.312(a)(2)(iii) - Automatic Logoff

Monitor changes to Windows Group Policy and Office 365 policies that define automated logoff, session timeout, and access token timeout parameters.

164.312(a)(2)(iv) - Encryption and Decryption

Monitor changes to Windows Registry or application configuration files that define encryption settings for ePHI.

164.312(b) – Audit Controls - Implement hardware software and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information.

Monitor changes to Office 365 policies including Data Loss, information management, and more.

File Integrity Monitoring can detect modification attempts to applications or online storage containing electronic protected health information.

164.312(e)(1) – Transmission Security - Implement technical security measures to guard against unauthorized access to electronic protected health information that is being transmitted over an electronic communications network.

164.312(e)(2)(i) – Integrity Controls

Identify untrusted network, monitor for changes in Group policies, Office 365 and more

File Integrity Monitoring can detect modification attempts to applications or online storage containing electronic protected health information.

164.312(e)(2)(ii) - Encryption

Monitor changes to Windows Registry or application configuration files that define encryption settings for ePHI.

164.316(a) – Policies and Procedures - Implement reasonable and appropriate policies and procedures to comply with the standards implementation specifications.

164.316(b)(1)(i)(ii) – Documentation

Policy Management – Review and update all policies and procedures documents within the portal

164.316(b)(2)(i) – Time Limit

164.316(b)(2)(i) – Time Limit Validate and monitor the expiry of your policies and get alerts

164.316(b)(2)(ii) – Availability

Policy portal available to all your employees to read and accept the terms

164.316(b)(2)(iii) - Updates

All updates get reflected and is notified to all employees of changes

Contact Us
Invalid email address
Please Wait....

READY TO TALK TO OUR EXPERT?

Contact Us