Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

HIPPA Compliance - How can we get started?

Posted on 2011-09-27
2
Medium Priority
?
285 Views
Last Modified: 2012-05-12
Good evening,

We have been told that our server and workstations need to be HIPPA compliant. I have searched for a list of guidelines for System Administrators but have not been successful in finding anything that doesn't require purchase of an application, etc...

Is there a good resource that provides guidelines and recommendations for putting an action plan together to make our systems compliant?

Any suggestions will be greatly appreciated.

Thanks
0
Comment
Question by:Poly11
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 13

Accepted Solution

by:
khairil earned 2000 total points
ID: 36714750
HIPAA is related to medical related data privacy which means anything that related to gather, process or outputting medical records must comply with certain guidelines that defined by HIPAA.

Like ISO, ITIL, HIPAA present guidelines how to the situation must be, not how exactly in technical term the configuration of the system being done - in other words it does spell what it needs but not how to do it.

I attach here, the public publication of National Institude of Standards and Technology US. Just like ISO, most of the situation are based on questions.

This document is general guidelines, the will not go detail on the implementations. So many vendor create tools or do consultation based on the guidelines - which why when you search the web, most result are about selling product or consultation.

If you are serious, then go get a book on it, read and understand, this is the good one to start, http://www.amazon.com/Practical-Guide-Privacy-Security-Compliance/dp/0849319536#_


SP-800-66-Revision1.pdf
0
 

Author Closing Comment

by:Poly11
ID: 36954622
Thank you, the book has all of the information I need to get started!
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I don't pretend to be an expert at this, but I have found a few things that are useful. I hope that sharing them here will help others, so they will not have to face some rather hard choices. Since I felt this to be a topic of enough importance and…
Check out what's been happening in the Experts Exchange community.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question