When it comes to data security, regardless of your industry sector, you’re likely to have to deal with compliance regulations. If you’re in the legal industry, there is the Law Society’s Lexcel standards. If you handle cardholder data, you’ll have to comply with PCI DSS. And if you work in healthcare, there are guidelines from … Continued
Meeting HIPAA compliance to track and recover lost files.
A world-class medical imaging practice chooses FileAudit to track and recover lost files. A medical practice based in New England offers diagnostic services to the medical profession. It has a network of private facilities, staffed by board-certified radiologists, registered technologists, and a team of dedicated staff that offers physicians and patients prompt and professional service. … Continued
HIPAA Access Control
Access control is the first Technical Safeguard Standard of the HIPAA Security Rules. It is described in HIPAA compliance as the responsibility for all healthcare providers to allow access only to those users (or software programs) that have been granted access rights. So no matter how much healthcare organizations spend on protecting their network perimeter, the … Continued
Concurrent Session Control in Healthcare for CMS compliance
“UserLock is the only solution on the market that allows our organisation to fulfill the CMS compliance requirements for its government contracts. It is absolutely critical to our business in this respect, but brings with it numerous other benefits in usability and reporting functionality.” Technology Editor for Active Directory, Leading US Healthcare Insurance Provider … Continued
How HIPAA Technical Safeguards Are Key to Compliance
HIPAA’s Security Rule divides its protections into three “safeguard” categories: technical, administrative and physical. HIPAA technical safeguards are the foundation of HIPAA compliance, and in this post you’ll learn how both UserLock and FileAudit help meet different security requirements and better protect patient data. What is the purpose of technical security safeguards? The Technical Safeguards … Continued
The wonderful thing about healthcare compliance
“The wonderful thing about standards is that there are so many of them to choose from.” — Rear Admiral Grace Murray Hopper, pioneering computer scientist Despite HIPAA’s security rules imposing restricted access to electronic patient information and increased recent pressure from the ICO on the NHS’ data protection practices, IS Decisions’ latest research has found several reasons … Continued
Healthcare Compliance Report – Data Security Posture
IS Decisions report Healthcare: Data access compliance, highlights several issues that have a direct effect to security of information within the healthcare industry. The report follows a narrative of a user’s employment from what happens when they start employment, through the granular details of network access on to changing roles or leaving an organization. The likely … Continued
HIPAA unique user identification in a Windows System
Healthcare is one of the most information intensive industries in society today, with patient data naturally being of a very sensitive nature, and the handling of that data often very complex. So to help protect this information, US medical organizations must adhere to HIPAA (Health Insurance Portability and Accountability Act), a set of regulations enforced … Continued
HIPAA & Network Security for Windows Active Directory
Secure your organization’s network for HIPAA compliance. New revisions to federal privacy and security regulations (the HIPAA Omnibus Final Rule) are now in place with full effect from September 23rd. It concerns the necessary safeguards for protected health information – and stem from changes made under the Health Information Technology for Economic and Clinical Health … Continued
Auditing Logon Events. Why stop there?
Auditing logon events across a Windows network is often a priority for organizations wanting to secure access to their network and better understand user activity. What’s more it is required for an Information System to comply with most major regulatory constraints. However, auditing logon events on their own is not enough for organizations who are … Continued