Here's a link to a whitepaper on the subject of HIPAA's Final Security
Rule.

http://www.hipaadvisory.com/regs/finalsecurity/summaryanalysis.htm

While I don't know one way or another if there's source code mandate in
the Security Rule, under the Technical Safeguards header, it says that
covered entities must implement 

"Policies and procedures to protect EPHI from improper alteration or
destruction to ensure data integrity. This integrity standard is coupled
with one addressable implementation specification for a mechanism to
corroborate that EPHI has not been altered or destroyed in an
unauthorized manner."

In all liklihood, a HIPAA auditor would consider a company in breach of
that clause if EPHI (Electronic Personal Health Information) were in the
hands of a 3rd party vendor, unless the standards in the next header
"Business Associate Contracts" were maintained.  Quoting:

"For relationships where a third party is used to create, receive,
maintain or transmit EPHI on the covered entity's behalf, the Security
Rule requires the business associate to:

    * Implement administrative, physical and technical safeguards that
reasonably and appropriately protect the confidentiality, integrity and
availability of the covered entity's EPHI;

    * Ensure that its agents and subcontractors to whom it provides EPHI
meet the same standard;

    * Report to the covered entity any security incident of which it
becomes aware; and

    * Ensure that the contract authorizes termination if the business
associate has violated a material term."

The thing is, if HIPAA is handled the way Sarbanes-Oxley and DCAA
(Defense Contracter Auditing Agency) are handled, what you have is a
broad set of guidelines, and an auditing team that determines whether or
not you are following those guidelines.  I've only gone through one
SarBox audit, but with the DCAA, the standards of what is and is not
acceptable vary wildly from site to site, and from audit team to audit
team.

Just some thoughts.  

Matt Osbun
Web Developer
Health Systems, International



-----Original Message-----
From: Jochem van Dieten [mailto:[EMAIL PROTECTED] 
Sent: Saturday, August 06, 2005 4:57 AM
To: CF-Talk
Subject: Re: OT - Security Of Sensitive Data


I am not very familiar with HIPAA reglations, but it sounds like 
they are something like the procedural and technical guidelines 
from the Dutch Data Protection Authority. Those guidelines 
mandate that if you store class 2 or higher personal data (lots 
of relatively harmless data like name and address, or a little 
bit of sensitive data like health records), you need to have 
access to the source code of every piece of software you use to 
process that data.
Does the HIPAA mandate something similar?

Jochem

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Logware (www.logware.us): a new and convenient web-based time tracking 
application. Start tracking and documenting hours spent on a project or with a 
client with Logware today. Try it for free with a 15 day trial account.
http://www.houseoffusion.com/banners/view.cfm?bannerid=67

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:214003
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54

Reply via email to