Your request for Endpoint Protector was sent!
One of our representatives will contact you shortly to schedule a demo.
Free, custom demo to suit your needs
One of our representatives will contact you shortly to schedule a live demo. We'll answer questions, address your concerns and tailor the demo to your needs.



* We don't share your personal info with anyone.
Check out our Privacy Policy for more information.
Please use a valid email address!
Thousands of global clients
already use our product
Trusted by companies of all sizes, from all industries. Fortune 500 companies, Universities, Governments, Banks, Media, and more.
Join them

Download our FREE ebook on GDPR compliance. Download Now

All You Need to Know about HIPAA Compliance

The Health Insurance Portability and Accountability Act (HIPAA) was originally passed by the US Congress in 1996 during the Clinton administration and while its primary purpose was to allow workers to carry forward insurance and healthcare rights between jobs, in time it became better known for its stipulations concerning the privacy and security of protected health information (PHI).

With the rise of electronic health records and healthcare providers’ own push for digitalization that began including apps, email correspondence and social media as ways of communicating with patients and customers, the Health Information Technology for Economic and Clinical Health Act (HITECH) expanded HIPAA’s privacy and security scope by increasing its legal liability and providing a stricter enforcement of its requirements.

HIPAA is governed by three main rules:

  • The Privacy Rule which details how PHI can be used and disclosed;
  • The Security Rule that includes the necessary standards and safeguards needed to protect electronic PHI at rest and in transit;
  • The Breach Notification Rule that requires organizations to notify patients and the proper authorities in case of a PHI data breach.

The Department of Health and Human Services’ Office for Civil Rights (OCR) has been responsible for the enforcement of HIPAA since 2003.

Who does HIPAA apply to?

The general tendency is to regard PHI as the domain of hospitals and healthcare institutions. In today’s digital age however, healthcare providers rarely operate independently: they often share information with business associates or require subcontractors to perform services that may require the disclosure of PHI.

HIPAA covers all these entities: the actual providers that offer treatment, payment or operations in healthcare, but also all the associates with access to patient information that support them in the discharge of these services. Subcontractors, as well as business partners’ own associates, must comply with HIPAA.

Additionally, under the HITECH Act, healthcare providers are obligated to notify their business associates and subcontractors that they must comply with HIPAA.

What does HIPAA protect?

Protected Health Information (PHI) that falls under the incidence of HIPAA refers to information related to an individual’s past, present, or future physical or mental health and the provision of healthcare to an individual. It also includes personal identifiers such as name, address or Social Security Number that, by themselves or grouped with other identifiers, can reveal a person’s identity, medical history or payments he has made.

The Privacy Rule

In force since 2003, the HIPAA Privacy Rule establishes national standards to protect individuals’ medical records and other personal health information. It applies to all healthcare and health plan providers, healthcare clearinghouses, and certain electronic healthcare transactions.

The Privacy Rule requires that appropriate safeguards be put in place to protect the privacy of PHI and sets the conditions and limits of the use and disclosure of PHI without patient authorization. Through it, patients or their representatives can ask for a copy of their records that they can then examine and request to be corrected.

Organizations falling under the incidence of HIPAA are required to answer such patient access requests within 30 days. Notices of Privacy Practices (NPPs) must also be issued to explain to patients how their data will be used or shared.

The Security Rule

The Security Rule more specifically addresses the protection of individuals’ electronic protected health information (ePHI) that is created, received, used, or maintained by entities covered by HIPAA. It establishes a set of standards and safeguards that need to be put into place to ensure the confidentiality, integrity, and security of ePHI.

There are three types of safeguards under the Security Rule:

  • Technical Safeguards that refer to the technology used to protect and access ePHI;
  • Physical Safeguards that deal with physical access to ePHI regardless of its location;
  • Administrative Safeguards that include actions, policies, and procedures responsible for the enforcement of ePHI protection and the conduct of an organization’s workforce.

The Breach Notification Rule

Similar to the GDPR’s mandatory data breach notifications, the HIPAA Breach Notification Rule requires covered entities to notify patients in case of a data breach that included their PHI as well as the OCR and the media if the breach affects more than five hundred patients.

Smaller breaches that affect fewer than 500 individuals must also be reported through the OCR web portal. Breach notifications must be made without undue delay no later than 60 days after the discovery of a breach. When patients are notified of the breach, they must be informed what they can do to protect themselves from potential harm, how the organization is investigating the incident and how it will avoid other security incidents in the future.

Fines under HIPAA

Federal fines for noncompliance with HIPAA can be issued by the OCR and state attorneys general and are separated into four tiers, depending on the level of perceived negligence at the time of the HIPAA violation. They range from as little as $100 to as much as $1.5 million per year for each violation.

Looking to stay compliant under HIPAA? Check our healthcare Data Loss Prevention.

Frequently Asked Questions

Why is DLP required?

Data Loss Prevention (DLP) solutions help organizations to protect sensitive data such as Personally Identifiable Information (PII) or Intellectual Property (IP) from accidental exposure. Wherever data lives - in transit on the network, at rest in storage, or in use -, DLP tools can monitor it and substantially diminish the risk of data loss. By deploying a DLP solution, companies can also reduce insider threats and reach compliance with data protection regulations such as the GDPR, CCPA, PCI DSS, or HIPAA.

Learn more about Data Loss Prevention.

How to choose between a dedicated DLP and an integrated DLP?

Organizations looking to deploy a DLP solution should first assess their needs and capabilities, as well as evaluate their data protection strategy, and then decide which approach fits better. When looking to choose between a dedicated DLP and integrated DLP solution, the following questions might help:

  • What type of sensitive data is collected and stored by the company?
  • Where does sensitive data reside and who has access to it?
  • What operational resources does the company have in place?
  • What channels (email, web, cloud apps etc.) need coverage?

Find out why enterprises need a DLP solution.

Is Endpoint Protector an integrated DLP?

No, Endpoint Protector is not an integrated DLP solution, it is a dedicated DLP software, known also as enterprise DLP. It is a security product specifically built and designed for data loss prevention, an essential tool in any comprehensive cybersecurity strategy. Our solution ensures enhanced data security, protects against insider threats and offers predefined compliance profiles for GDPR, PCI DSS, HIPAA, and more.

Learn more about an integrated DLP vs Endpoint Protector.

Why choose Endpoint Protector DLP?

Endpoint Protector is an advanced endpoint Data Loss Prevention (DLP) solution that allows companies to monitor and control multiple data flows, including file transfers via the Internet (such as e-mail clients, web browsers or instant messaging applications) as well as transfers to the cloud (such as iCloud, Google Drive, Dropbox). The solution also provides data visibility on the endpoints, which is essential for compliance. Endpoint Protector offers flexibility and granular control, as well as multiple deployment options.

Check out the top 7 reasons to start your DLP strategy with Endpoint Protector

explainer-c_compliant-industry

Download our free ebook on
GDPR compliance

A comprehensive guide for all businesses on how to ensure GDPR compliance and how Endpoint Protector DLP can help in the process.

guest
1 Comment
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Mirrorfly
1 year ago

A to Z information about HIPAA, Beginner to Expert get knowledge form this article kudos to author