{"id":134,"date":"2021-06-28T09:13:23","date_gmt":"2021-06-28T09:13:23","guid":{"rendered":"https:\/\/epicomm.net\/web\/blog\/?p=134"},"modified":"2025-12-02T06:03:27","modified_gmt":"2025-12-02T06:03:27","slug":"making-your-app-hippa-compliant","status":"publish","type":"post","link":"https:\/\/epicomm.net\/web\/blog\/making-your-app-hippa-compliant\/","title":{"rendered":"Making Your App HIPPA Compliant"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-135\" src=\"https:\/\/epicomm.net\/web\/blog\/wp-content\/uploads\/2021\/06\/hippa.jpg\" alt=\"\" width=\"800\" height=\"385\" \/><\/p>\n<ol>Nowadays making your healthcare App HIPPA compliant has become most important thing to protect patient&#8217;s health information.<br \/>\nThe Health Insurance Portability and Accountability Act (HIPAA) sets the standard for sensitive patient data protection. Companies that deal with protected health information (PHI) must have physical, network, and process security measures in place and follow them to ensure HIPAA Compliance.<br \/>\nCovered entities (anyone providing treatment, payment, and operations in healthcare) and business associates (anyone who has access to patient information and provides support in treatment, payment, or operations) must meet HIPAA Compliance. Other entities, such as subcontractors and any other related business associates must also be in compliance.<\/ol>\n<ul>\n<ol>\n<strong><\/p>\n<h3>Protected health information (PHI) :<\/h3>\n<p><\/strong><\/ol>\n<\/ul>\n<ul>\n<ol>The US Department of Health and Human Services defines 18 classes of personal information that constitute the PHI in combination with health data:<\/ol>\n<\/ul>\n<ol>\n<li style=\"list-style-type: none\">\n<ol>\n<li style=\"list-style-type: none\">\n<ol>\n<li style=\"list-style-type: none\">\n<ol>\n<li>Names of patients<\/li>\n<li>All geographical subdivisions smaller than a state<\/li>\n<li>Dates directly related to an individual, including birth date, admission date, discharge date, date of death<\/li>\n<li>Phone numbers<\/li>\n<li>Fax numbers<\/li>\n<li>Emails<\/li>\n<li>Social Security numbers<\/li>\n<li>Medical record numbers<\/li>\n<li>Health plan beneficiary numbers<\/li>\n<li>Account numbers<\/li>\n<li>Certificate\/license numbers<\/li>\n<li>Vehicle identifiers and serial numbers, including license plate numbers<\/li>\n<li>Device identifiers and serial numbers<\/li>\n<li>Web URLs<\/li>\n<li>IP addresses<\/li>\n<li>Biometric identifiers, including finger and voiceprints, Full face photographic images and any comparable images<\/li>\n<li>Any other unique identifying number, characteristic, or code<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<p><strong><\/p>\n<h3>What does HIPAA compliance for health applications mean for developers?<\/h3>\n<p><\/strong><\/p>\n<p>The technology used to protect electronic PHI and control the access to it under certain standards such as audit controls, integrity, and access controls.<\/p>\n<ul>\n<ul>\n<li><strong><b>The Audit Controls standard<\/b><\/strong><\/ul>\n<ul>Requires a medical app developer to have the hardware, software, and\/or procedural mechanisms in place that track, record, and examine activities in systems that contain or use electronic PHI.<b>\u00a0<\/b><\/ul>\n<\/li>\n<ul>\n<li><strong><b>The Integrity standard<\/b><\/strong><\/ul>\n<ul>Requires policies and procedures to protect electronic PHI from improper alteration or destruction to be used by a covered entity.<\/ul>\n<\/li>\n<ul>\n<li><strong><b>Access Controls standard<\/b><\/strong>\u00a0requires:<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<ul>\n<li>a)\u00a0Unique user identification system (using password or PIN, a smart card or a key, or biometric data)<\/ul>\n<\/li>\n<ul>\n<li>b)\u00a0emergency access procedures (for example, in case of power failure),<\/ul>\n<\/li>\n<ul>\n<li>c)\u00a0Automatic logoff<\/ul>\n<\/li>\n<ul>\n<li>d)\u00a0Data encryption and decryption at all stages.<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<br \/>\n<strong><\/p>\n<h3>HIPAA Compliance is broken into four Rules which govern four major points of the compliance:<\/h3>\n<p><\/strong><br \/>\n&nbsp;<\/p>\n<ol>\n<ul>\n<li>Access:<\/ul>\n<ul>Only the people who need to have access to private health care data should be granted access.<br \/>\nThis includes health care service industry employees and hosting business employees. Anyone who may come in contact with PHI should be scrutinized for need and granted accesses appropriately. If a specific team or individual doesn\u2019t need access to PHI, they should not have it.<\/ul>\n<\/li>\n<ul>\n<li>Handling:<\/ul>\n<ul>No one outside controlled members of the organization should be able to see PHI. While the data is at rest, it should be encrypted. Backups of the data should be encrypted, the means of access and transmission should be encrypted, and the physical security of your machines needs to be maintained and controlled at all times. Logs need to be diligently kept for every time PHI is accessed, changed, updated, or moved. Lastly, once you\u2019re done with the data, be it account termination or a migration, any physical copies of the data (i.e., hard drives) need to be appropriately disposed of to ensure complete data integrity.<\/ul>\n<\/li>\n<ul>\n<li>Notification:<\/ul>\n<ul>The HIPAA Breach Notification rule sets standards for how PHI data breaches must be handled should the unthinkable happen. In general, a breach is defined as any uncontrolled access to unencrypted PHI.<br \/>\nBreaches are further broken into two types, Minor breaches, which affect fewer than 500 individuals, and Meaningful breaches, which affect greater than 500 individuals.<br \/>\nBreaches do not necessarily equal violations. A violation is when a breach comes as a result of a poorly defined, partially implemented, loosely maintained, or generally incomplete compliance process; or as a result of direct violation of properly implemented processes and procedures.<\/ul>\n<\/li>\n<ul>\n<li>Reach:<\/ul>\n<ul>It\u2019s possible to maintain HIPAA compliance even when parts of your processes are outsourced to other companies.<br \/>\nJust make sure the other company is also HIPAA compliant, and you have executed a BAA before allowing access to PHI.<\/ul>\n<\/li>\n<\/ol>\n<p><strong><\/p>\n<h3>Database Hosting:<\/h3>\n<p><\/strong><\/p>\n<p>There are two primary ways of database hosting, dedicated database hosting and tandem database hosting.<br \/>\nWhether you use a dedicated database server or a database service running on a web server, if PHI will be stored there, the entire server is required to follow all compliance guidelines. These guidelines fall into four categories:<\/p>\n<ol>\n<ul>\n<li>Data handling:<\/ul>\n<ul>Data Handling refers to data that is ready to be accessed, data that is being accessed, and data that\u2019s moving so it can be accessed once received. And these processes are governed by one concept: encryption<br \/>\nAccording to the HIPAA Security rule, no one should simply be able to see PHI. That means data should be encrypted while at rest or in transit.<\/ul>\n<\/li>\n<ul>\n<li>Backups:<\/ul>\n<ul>Database backups are paramount to a company\u2019s survival, and the governing bodies understand this, which is why HIPAA compliance has stipulations specifically for maintaining backups.<br \/>\nNot having backups is a direct violation of HIPAA compliance.<br \/>\nFurther, those backups must follow the encryption policies for data handling. They must be encrypted, accessed only via encrypted means, and maintain encryption in transit.<br \/>\nBackups Also Require Testing.<\/ul>\n<\/li>\n<ul>\n<li>Physical Safeguards:<\/ul>\n<ul>According to the Security Rule, physical access must be controlled and logged.<br \/>\nLuckily, as per the Omnibus rule, a third-party can handle almost any aspect of your compliance, so long as they\u2019re HIPAA compliant and there\u2019s a BAA executed. This includes physical access!<\/ul>\n<\/li>\n<ul>\n<li>Logging:<\/ul>\n<ul>As part of the HIPAA compliance audit process, a compliance officer will require documentation showcasing all of the above points are followed. This means all access to your databases needs to be logged, and those logs need to be maintained<\/ul>\n<\/li>\n<\/ol>\n<p><strong><\/p>\n<h3>Minimum list of required features for HIPAA compliant software:<\/h3>\n<p><\/strong><\/p>\n<ol>\n<li style=\"list-style-type: none\">\n<ol>\n<li>Access control<\/li>\n<li>Person or entity authentication<\/li>\n<li>Transmission security<\/li>\n<li>Encryption\/decryption<\/li>\n<li>PHI disposal<\/li>\n<li>Data backup and storage<\/li>\n<li>Audit controls<\/li>\n<li>Automatic logoff<\/li>\n<li>Mobile app extra-security<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>Above listed points are minimum required features for HIPPA compliance and they alone won&#8217;t guarantee it&#8217;s security.<br \/>\nBut having these features should convince an auditor that you\u2019ve done enough to protect your client data.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Nowadays making your healthcare App HIPPA compliant has become most important thing to protect patient&#8217;s health information. The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for sensitive patient data protection. Companies that deal with protected health information (PHI) must have physical, network, and process security measures in place and follow them to &hellip; <a href=\"https:\/\/epicomm.net\/web\/blog\/making-your-app-hippa-compliant\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Making Your App HIPPA Compliant&#8221;<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-134","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/epicomm.net\/web\/blog\/wp-json\/wp\/v2\/posts\/134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/epicomm.net\/web\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/epicomm.net\/web\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/epicomm.net\/web\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/epicomm.net\/web\/blog\/wp-json\/wp\/v2\/comments?post=134"}],"version-history":[{"count":71,"href":"https:\/\/epicomm.net\/web\/blog\/wp-json\/wp\/v2\/posts\/134\/revisions"}],"predecessor-version":[{"id":258,"href":"https:\/\/epicomm.net\/web\/blog\/wp-json\/wp\/v2\/posts\/134\/revisions\/258"}],"wp:attachment":[{"href":"https:\/\/epicomm.net\/web\/blog\/wp-json\/wp\/v2\/media?parent=134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/epicomm.net\/web\/blog\/wp-json\/wp\/v2\/categories?post=134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/epicomm.net\/web\/blog\/wp-json\/wp\/v2\/tags?post=134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}