Ten-point Checklist to Find out if Your Cloud Provider Is HIPAA-ready - Slide 2

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12
Next Next

Your cloud provider must have a security program that meets the specific policies and procedures required by HIPAA.

Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

If you’re a Covered Entity under HIPAA, you may be torn between moving your data into the cloud or continuing to maintain it in your own data center. Either way, you must be sure you’re complying with HIPAA requirements. 

For highly regulated industries like healthcare with strict compliance requirements, the cloud presents a particular challenge.  “When it comes to the cloud, privacy and security is a big deal for Covered Entities,” says Von Williams, security analyst for Logicalis.  “While it remains the ultimate responsibility of the Covered Entity to comply with HIPAA, there are policies and procedures that a cloud provider can have in place to lift the burden of securing at-rest and in-transit data from the shoulders of the Covered Entity.”  The key, Williams says, is in knowing what to look for.

To help IT pros assess a potential cloud provider’s HIPAA readiness, Logicalis has developed a 10-point checklist addressing privacy and security of healthcare data.

 

More Slideshows

Lumension10QsSecurityVendors0x 2015 Endpoint and Mobile Security Procurement: 10 Questions to Ask New Vendors

In the spirit of 2015 planning, now is the time of year when IT teams start to tackle big, complicated issues like endpoint and mobile security. ...  More >>

Security41-190x128 Cybersecurity Grades Released for Key Industries

Looking at cyber data through a business intelligence lens ensures that security-related trends and potential impacts to organizations can be understood and effectively addressed. ...  More >>

Security40-190x128 Five Ways Encryption Has (or Hasn't) Changed Since Snowden

Findings from a new study take a closer look at the evolution of encryption, analyzing adoption rates of the technology and the evolution of privacy awareness. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.