[Webinar] Streamline your web hosting managementRegister Today

x
?
Solved

HIPPA Compliance - How can we get started?

Posted on 2011-09-27
2
Medium Priority
?
298 Views
Last Modified: 2012-05-12
Good evening,

We have been told that our server and workstations need to be HIPPA compliant. I have searched for a list of guidelines for System Administrators but have not been successful in finding anything that doesn't require purchase of an application, etc...

Is there a good resource that provides guidelines and recommendations for putting an action plan together to make our systems compliant?

Any suggestions will be greatly appreciated.

Thanks
0
Comment
Question by:Poly11
2 Comments
 
LVL 13

Accepted Solution

by:
khairil earned 2000 total points
ID: 36714750
HIPAA is related to medical related data privacy which means anything that related to gather, process or outputting medical records must comply with certain guidelines that defined by HIPAA.

Like ISO, ITIL, HIPAA present guidelines how to the situation must be, not how exactly in technical term the configuration of the system being done - in other words it does spell what it needs but not how to do it.

I attach here, the public publication of National Institude of Standards and Technology US. Just like ISO, most of the situation are based on questions.

This document is general guidelines, the will not go detail on the implementations. So many vendor create tools or do consultation based on the guidelines - which why when you search the web, most result are about selling product or consultation.

If you are serious, then go get a book on it, read and understand, this is the good one to start, http://www.amazon.com/Practical-Guide-Privacy-Security-Compliance/dp/0849319536#_


SP-800-66-Revision1.pdf
0
 

Author Closing Comment

by:Poly11
ID: 36954622
Thank you, the book has all of the information I need to get started!
0

Featured Post

Managing Security & Risk at the Speed of Business

Gartner Research VP, Neil McDonald & AlgoSec CTO, Prof. Avishai Wool, discuss the business-driven approach to automated security policy management, its benefits and how to align security policy management with business processes to address today's security challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This blog will spread awareness about Dropbox. We have given the statements based upon our experience. Along with this, there is a section of some new plans that should be added in Dropbox this year. This will make the storage service enhanced from …
There’s hardly a doubt that Business Communication is indispensable for both enterprises and small businesses, and if there is an email system outage owing to Exchange server failure, it definitely results in loss of productivity.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

607 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question