Solved

Terminal Server and HIPAA Compliance

Posted on 2006-07-17
7
571 Views
Last Modified: 2010-04-11
All:

Just wanted to find out whether or not Terminal Server is considered HIPAA Compliant.  Does any one have any information regarding this?  Also your thoughts on PC Anywhere and HIPAA Compliance

jocasio
0
Comment
Question by:Juan Ocasio
  • 4
  • 3
7 Comments
 
LVL 14

Expert Comment

by:chris_calabrese
ID: 17125730
First, software is not inherently HIPAA Compliant. It depends on how you use it.

That said, PC Anywere logs only to the local computer, so if you have a log management and reporting solution (which is required by HIPAA) based on getting logs from the domain controllers, TS will work with it, whereas PCA won't.
0
 
LVL 14

Author Comment

by:Juan Ocasio
ID: 17125859
So you are saying that my company can be HIPAA complaint while using Terminal Server?  I guess that was my real question.  We want clients to have the ability to view their accounts via Terminal Server so we want to make sure this would not have an affect with respect to HIPAA compliance.

Thanks again,

jocasio
0
 
LVL 14

Expert Comment

by:chris_calabrese
ID: 17125879
Yes, it is possible to be HIPAA Compliant and use Terminal Server. Whether you are compliant currently or will implement TS in such a way to remain compliant, is another matter howerver.
0
Network it in WD Red

There's an industry-leading WD Red drive for every compatible NAS system to help fulfill your data storage needs. With drives up to 8TB, WD Red offers a wide array of solutions for customers looking to build the biggest, best-performing NAS storage solution.  

 
LVL 14

Author Comment

by:Juan Ocasio
ID: 17126425
How would you suggest implementing TS to remain compliant?
0
 
LVL 14

Accepted Solution

by:
chris_calabrese earned 125 total points
ID: 17130117
HIPAA Security Rule is all about access control, addressing vulnerabilities, and audit log reporting.

A compliant TS implementation would limit who could connect, limit what authorized individuals could do once they connected, keep up to date on patches, and have someone reviewing the logs of who connected and what they did.
0
 
LVL 14

Author Comment

by:Juan Ocasio
ID: 17132404
Thanks for the info!
0
 
LVL 14

Expert Comment

by:chris_calabrese
ID: 17132434
No problem
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
By this time the large percentage of day-to-day transactions have shifted to mobile banking; here are some overriding areas QAs must investigate while testing mobile banking apps.  
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
A simple description of email encryption using a secure portal service. This is one of the choices offered by The Email Laundry for email encryption. The other choices are pdf encryption which creates an encrypted pdf of your email and any attachmen…

912 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now