{"id":29446,"date":"2015-03-05T08:44:22","date_gmt":"2015-03-05T13:44:22","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/will-hipaa-require-encryption.php"},"modified":"2015-03-05T08:44:22","modified_gmt":"2015-03-05T13:44:22","slug":"will-hipaa-require-encryption","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/will-hipaa-require-encryption.php","title":{"rendered":"Will HIPAA Require Encryption?"},"content":{"rendered":"<p><p>    By Megan    Williams, contributing writer  <\/p>\n<p>    You and your healthcare IT clients could be facing even more    legislation around healthcare data, and this time, its about    encryption.  <\/p>\n<p>    Currently, the Health Insurance Portability and Accountability    Act (HIPAA) and the Health Information Technology for Economic    and Clinical Health (HITECH) Act do not contain mandates around    encryption, but that may soon change. The Senate Health,    Education, Labor, and Pensions committee is rethinking its    approach to encryption in their efforts to revisit HIPAA,    according to FierceHealthIT.  <\/p>\n<p>    The legislation is coming up on its 20-year anniversary, and    many in the industry feel regulations around encryption dont    properly address the new security threats that are becoming    so common in the healthcare sector.  <\/p>\n<p>    HITECH  <\/p>\n<p>    The answer to HIPAAs lack of focus on encryption came in 2009    in the form of the HITECH Act, which, much like todays    Meaningful Use initiatives, placed incentives around    encryption, and avoided imposing a rigid solution across the    industry. Indiana University law professor, Nicolas Terry told    the AP, that it seemed like a reasonable balance at the time,    but that recent events may have proven the compromise    unworkable.  <\/p>\n<p>    Basically, the industry hasnt gone for the incentives in big    enough ways. Over 40 percent of healthcare employees arent    using full-disk, or file-level encryption devices at work,    according to a Forrester research report, leaving huge segments    of the industry vulnerable, just as attacks are increasing, and growth    in security-testing concepts like the Internet of Things are    taking off.  <\/p>\n<p>    The current chair of the HIMSS Privacy And Security Policy Task    Force doesnt believe much will happen, though, before the next    presidential election.  <\/p>\n<p>    On a smaller level, states like New Jersey have taken the lead,    and enacted legislation requiring health insurance companies to    encrypt patient information, according to NJ.com. All insurance    companies using data containing personal information must    either protect that data by encryption, or by any other method    or technology rendering it unreadable, undecipherable, or    otherwise unusable by an unauthorized person.  <\/p>\n<p>    Where Encryption Falls Short  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.bsminfo.com\/doc\/will-hipaa-require-encryption-0001?atc~c=771+s=773+r=001+l=a\/RK=0\/RS=2kHdSzuQaiYpxYVfNFHKZ9EwELw-\" title=\"Will HIPAA Require Encryption?\">Will HIPAA Require Encryption?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> By Megan Williams, contributing writer You and your healthcare IT clients could be facing even more legislation around healthcare data, and this time, its about encryption. Currently, the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health (HITECH) Act do not contain mandates around encryption, but that may soon change<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-29446","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29446"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=29446"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29446\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=29446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=29446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=29446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}