Hippa Hi-Tech Checklist

Posted on 2013-11-01
Last Modified: 2013-11-06
Looking For a Checklist for Computer Security

What is Suggested

What is Preferred

What is Mandatory

Also what is a Good Encryption Solution for laptops and Tablets that go home with the
Dr. and Office Manager?


Question by:Joseph Salazar
  • 2
  • 2
LVL 26

Expert Comment

ID: 39616796
Best place to start for HIPPA compliance would be with their site:

As for the security of laptops that go home, I work at a financial institution that has similar requirements and we use Sophos Safeguard Easy for FDE (Full Disk Encryption), It comes with their Enterprise license.

Author Comment

by:Joseph Salazar
ID: 39620410
Thanks Pony,

But that Site is 100% absolutely correct and 100% useless

Anyone have a List they have made up?

LVL 26

Accepted Solution

pony10us earned 500 total points
ID: 39621744
There are a lot of checklists available.  Here is one that my brother (works in the medical field) suggested:

Author Closing Comment

by:Joseph Salazar
ID: 39628965

Works for me !!!!


Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Installation of Nessus Professional 5 99
How to limit traffic to Netscaler 10.5 VIP 3 70
Securing Access to Specific Folders 6 49
Review of a VPN cert policy 4 28
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Ransomware is a growing menace to anyone using a computer or mobile device. Here are answers to some common questions about this vicious new form of malware.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

825 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question