BTW, we're going to try to work out something with the local hospital for data storage. We want to do off site backup for them. Via a dedicated link to a server that never touches the internet!

I'll be working on physical security of the server as well as the transport needs. Issues like noc access and such.

We'll also be working on the frequency of the backups. ie: does the system need to backup the data every time a change is made? Or only a few times per day? Once per night?

I hope to meet with the hospital administrator here in a couple of weeks when we're not both so swamped.
Marlon
(509) 982-2181                                   Equipment sales
(408) 907-6910 (Vonage)                    Consulting services
42846865 (icq)                                    And I run my own wisp!
64.146.146.12 (net meeting)
www.odessaoffice.com/wireless
www.odessaoffice.com/marlon/cam



----- Original Message ----- From: "Peter R." <[EMAIL PROTECTED]>
To: "WISPA General List" <[email protected]>
Sent: Monday, November 27, 2006 2:44 PM
Subject: Re: [WISPA] Wireless Security biting you in the ass?


Great questions, Marlon!
You are correct that it is application/data encryption needed, not transport security.

Every hospital has a HIPAA Officer. Talk to that person. By 2009, they all have to have EMR and HIPPA compliance, along with some EDI with health insurance payers.

- Peter Radizeski
Consultant to the Internet Stars :)

Marlon K. Schafer (509) 982-2181 wrote:

Officially, hippa compliance is a CLIENT issue. As long as the data is properly encrypted there's no need for the transport to be.

Some will argue this (mainly the telco but sometimes the customer). It's still a fact.

Questions to ask them.
What do the Doctors use for connectivity to their handheld devices? Right, wireless.
What is the encryption mechanism on a t-1 or dsl link?  Right, none.
What is the security on the cable network?  Right, none.
Does the facility have a wireless network? Care to have me break into it for you? (I'm told that WPA has now been cracked too.)

We went around in circles with a local Sheriff's office on this issue. In the end it was decided that the only real way to be hippa compliant was to encrypt the data AT THE PC level. ANYTHING done after that point was all but useless. They confirmed this with the DOJ. All that's needed is data security, not transport security. If transport security is what's wanted then EVERY vlan switch, router etc. in the loop is a possible security hole. This risk runs end to end, regardless of the transport medium.

Good luck.
Marlon

--
WISPA Wireless List: [email protected]

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


--
WISPA Wireless List: [email protected]

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

Reply via email to