Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Hippa Hi-Tech Checklist

Posted on 2013-11-01
4
Medium Priority
?
319 Views
Last Modified: 2013-11-06
Looking For a Checklist for Computer Security

What is Suggested

What is Preferred

What is Mandatory

Also what is a Good Encryption Solution for laptops and Tablets that go home with the
Dr. and Office Manager?

Thanks,

Cjoego
0
Comment
Question by:Joseph Salazar
  • 2
  • 2
4 Comments
 
LVL 26

Expert Comment

by:pony10us
ID: 39616796
Best place to start for HIPPA compliance would be with their site:  http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/securityruleguidance.html

As for the security of laptops that go home, I work at a financial institution that has similar requirements and we use Sophos Safeguard Easy for FDE (Full Disk Encryption), It comes with their Enterprise license.
0
 

Author Comment

by:Joseph Salazar
ID: 39620410
Thanks Pony,

But that Site is 100% absolutely correct and 100% useless

Anyone have a List they have made up?

Cjoego
0
 
LVL 26

Accepted Solution

by:
pony10us earned 2000 total points
ID: 39621744
There are a lot of checklists available.  Here is one that my brother (works in the medical field) suggested:  http://www.wvdhhr.org/han/security/hipaasecuritychecklistlhdsv2.pdf
0
 

Author Closing Comment

by:Joseph Salazar
ID: 39628965
Fantastic,

Works for me !!!!

Cjoego
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as high-speed processing of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
How does someone stay on the right and legal side of the hacking world?
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Suggested Courses

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question