Solved

Do I need to encrypt data over a point-to-point T1 for HIPAA?

Posted on 2007-12-03
3
416 Views
Last Modified: 2013-11-15
Do I need to encrypt data over a point-to-point T1 for HIPAA?  I know a non-switched circuit is pretty secure.  Do I need to have this traffic going through a tunnel to be safe?  There will be healthcare related data going accross.  What about HIPAA compliance?
0
Comment
Question by:dempsedm
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 12

Accepted Solution

by:
weareit earned 300 total points
ID: 20396887
By the strictest sense of security anytime data is accessed from a server it would need to be encrypted to ensure prying eyes have a difficult time accessing the data.  In many scenarios though, data sent on a local network is usually unencrypted.  Since a point-to-point T1 connection is an extension of your local network you could get away with transmitting the data an unencrypted format.  However, I would err on the safe side of things and encrypt the data anyway.

-saige-
0
 
LVL 79

Assisted Solution

by:lrmoore
lrmoore earned 200 total points
ID: 20408164
Short answer - no.
A point-point T1 does not traverse public circuits like a frame-relay point-multipoint would, or Internet would.
0
 
LVL 4

Author Comment

by:dempsedm
ID: 20475288
Ok, I think you guys are both right.  I will think about this some more.

Thanks,

d
0

Featured Post

On Demand Webinar - Networking for the Cloud Era

This webinar discusses:
-Common barriers companies experience when moving to the cloud
-How SD-WAN changes the way we look at networks
-Best practices customers should employ moving forward with cloud migration
-What happens behind the scenes of SteelConnect’s one-click button

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Smart phones, smart watches, Bluetooth-connected devices—the IoT is all around us. In this article, we take a look at the security implications of our highly connected world.
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question