Are you getting the most out of your AWS investment? Get your free AWS Well-Architected Assessment.

2021 Fillmore Street #1128

}

24/7 solutions

HIPAA Compliance in the Cloud

Joel Garcia Joel Garcia has been building AllCode since 2015. He’s an innovative, hands-on executive with a proven record of designing, developing, and operating Software-as-a-Service (SaaS), mobile, and desktop solutions. Joel has expertise in HealthTech, VoIP, and cloud-based solutions. Joel has experience scaling multiple start-ups for successful exits to IMS Health and Golden Gate Capital, […]

HIPAA Compliance for digital health startups is important.

In this blog post, we’ll define HIPAA, PHI, and HIPAA Compliance. We’ll then provide practical examples of PHI. We will specify some steps that need to be taken to secure PHI in a cloud environment. We’ll then begin to discuss some of the 3rd party vendors that offer different compliance solution.
The HIPAA Privacy Rule protects most “individually identifiable health information” held or transmitted by a covered entity or its business associate, in any form or medium, whether electronic, on paper, or oral. The Privacy Rule calls this information protected health information (PHI)2.
Practical examples of PHI are

  • Patient names
  • Addresses — In particular, anything more specific than state, including street address, city, county, precinct, and in most cases zip code, and their equivalent geocodes.
  • Dates — Including birth, discharge, admittance, and death dates.
  • Telephone and fax numbers
  • Email addresses
  • Social Security numbers
  • Driver’s License information
  • Medical record numbers
  • Account numbers
  • Health plan beneficiary numbers
  • Certification/license numbers
  • Vehicle identifiers and serial numbers, including license plate numbers
  • Device identifiers and serial numbers
  • Names of relatives
  • Internet Protocol (IP) address numbers
  • Biometric identifiers — including finger and voice prints.
  • Full face photographic images and any comparable images.

When your cloud application makes use of PHI, then your cloud application must take additional security steps to protect the PHI. These steps include:

  • Managing encryption at rest and in transit.
  • Encrypting database backups
  • Centralized Access Control system to audit who has access to the the PHI

There is a also a compliance angle to HIPAA. You can tell a vendor that you are compliant, but how do you prove it? In order to demonstrate HIPAA Compliance. You will invariably need to sign a Business Associate Agreement (BAA). The BAA will attest that the PHI provided to you will be protected, audited, used by professionals are educated on PHI, and have documented processes. You will need the following:

  • Automated Risk Assessment
  • Policy Procedures
  • Training for your workforce.
  • Incident Response Tool - Policy in place.
  • Intrusion detection software.

There are a number of different options in the cloud:
Aptible -  https://www.aptible.com - HIPAA Compliant Docker Container Solution
TrueVault - https://www.truevault.com - HIPAA Compliant Secure API to Store Health Data.
ClearDATA - https://www.cleardata.com - Healthcare Management Platform that resides on AWS.
AWS Snowball - https://aws.amazon.com/snowball/ - AWS Snowball enables you to to transfer large amounts of data, including Protected Health Information, into and out of the AWS Cloud in a secure and cost-effective manner

Joel Garcia
Joel Garcia

Joel Garcia has been building AllCode since 2015. He’s an innovative, hands-on executive with a proven record of designing, developing, and operating Software-as-a-Service (SaaS), mobile, and desktop solutions. Joel has expertise in HealthTech, VoIP, and cloud-based solutions. Joel has experience scaling multiple start-ups for successful exits to IMS Health and Golden Gate Capital, as well as working at mature, industry-leading software companies. He’s held executive engineering positions in San Francisco at TidalWave, LittleCast, Self Health Network, LiveVox acquired by Golden Gate Capital, and Med-Vantage acquired by IMS Health.

Related Articles

Models of Migration on AWS

Models of Migration on AWS

Cloud computing does offer many benefits to users who are just starting to put together applications and solutions. Having an existing solution will not preclude an organization from being able to take advantage of the cloud. Migrating those solutions to a cloud environment can prove to be tricky for users who haven’t planned in advance.

What is DevOps and How Developers Benefit

What is DevOps and How Developers Benefit

DevOps is a composition of best practices, principles, and company cultural concepts that are tailored to improve coordination in either development or IT teams in an organization. These standards help to streamline and automate the delivery cycle and allow teams to deploy applications sooner. In the case of arising issues, teams can respond faster and develop fixes sooner.

AWS Migration Acceleration Program

AWS Migration Acceleration Program

The AWS Migration Acceleration Program is offered to help organizations migrate existing applications and workloads to the Amazon Cloud more efficiently. This includes tools, resources, and guidance about the best practices for migration and how to facilitate changes properly without disrupting business operations.