{"id":3152,"date":"2022-02-07T13:02:07","date_gmt":"2022-02-07T13:02:07","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=3152"},"modified":"2022-09-13T10:03:29","modified_gmt":"2022-09-13T10:03:29","slug":"understanding-hipaa-security-2-2","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/","title":{"rendered":"Understanding the HIPAA Security Rule: What You Need to Know"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p><em>Revised and updated for 2022.<\/em><\/p>\n<p>The <a href=\"https:\/\/www.hhs.gov\/hipaa\/index.html\" target=\"_blank\" rel=\"noopener\">Health Insurance Portability and Accountability Act (HIPAA)<\/a> and its supporting rules provide a comprehensive framework for safeguarding Protected Health Information. The HIPAA Security Rule becomes even more important as the healthcare sector has become more digitized over the past two years and the attack surface has expanded.<\/p>\n<h2>What is Protected Health Information?<\/h2>\n<p>HIPAA defines PHI as \u201cany identifiable health information that is used, maintained, stored, or transmitted by a HIPAA-covered entity or a business associate of a HIPAA-covered entity, in relation to the provision of healthcare or payment for healthcare services.\u201d<\/p>\n<p>PHI includes health records, health histories, lab test results, and medical bills. Essentially, all health information is considered PHI when it includes individual identifiers. Health information ceases to be PHI if it is stripped of all identifiers that can tie the information to an individual. If the above identifiers are removed, the health information is referred to as de-identified PHI. HIPAA rules no longer apply to de-identified PHI.<\/p>\n<h2>The Need for Safeguarding PHI in the post-COVID-19 era<\/h2>\n<p>As the healthcare industry has moved from physical records to electronic ones, the risk of data being accessed or viewed by unauthorized entities has increased significantly. In fact, malicious actors are targeting health data due to the increased black-market value of stolen medical records and PHI.<\/p>\n<p>The COVID19 pandemic has created a new reality for the healthcare sector globally testing its limits. Adding to the overwhelming situation it is currently facing, the sector has become a direct target of cybersecurity attacks.<\/p>\n<p>In November 2021, The FBI, along with the Cybersecurity and Infrastructure Security Agency (CISA), the Australian Cyber Security Centre (ACSC), and the United Kingdom\u2019s National Cyber Security Centre (NCSC) <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-321a\" target=\"_blank\" rel=\"noopener\">issued<\/a> an advisory warning the healthcare and transportation sectors about an Iranian government-sponsored advanced persistent threat (APT) group that has been exploiting Microsoft Exchange ProxyShell and Fortinet vulnerabilities.<\/p>\n<p>In January 2022, following a warning from Microsoft regarding the Log4J vulnerability, the HHS 405(d) Task Group issued <a href=\"https:\/\/healthitsecurity.com\/news\/hhs-405d-urges-healthcare-sector-to-prioritize-log4j-vulnerability\" target=\"_blank\" rel=\"noopener\">a brief outlining the risks associated with the Log4j vulnerabilities<\/a> and urged the healthcare sector to prioritize patching and mitigating risk. Many cloud applications that healthcare organizations use for EHR services, along with other outsourced security services, frequently use the Log4J software.<\/p>\n<h2>The HIPAA Security Rule<\/h2>\n<p>The <a href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/laws-regulations\/index.html\" target=\"_blank\" rel=\"noopener\">Security Rule<\/a> sets national standards for protecting the confidentiality, integrity, and availability of electronic protected health information (ePHI). The Security Rule institutes three security safeguards \u2013 administrative, physical and technical \u2013 that must be followed to achieve full compliance with HIPAA. The objectives of the safeguards are the following:<\/p>\n<ul>\n<li>Administrative: to create policies and procedures designed to clearly show how the entity will comply with the act.<\/li>\n<li>Physical: to control physical access to areas of data storage and protect against inappropriate access.<\/li>\n<li>Technical: to protect PHI when transmitted electronically over communications networks.<\/li>\n<\/ul>\n<h2>Technical Safeguards for ePHI<\/h2>\n<p>The Security Rule requires covered entities and business associates to maintain reasonable and appropriate administrative, technical, and physical safeguards for protecting ePHI. Specifically, covered entities and business associates must:<\/p>\n<ul>\n<li>Ensure the confidentiality, integrity, and availability of all ePHI they create, receive, maintain, or transmit;<\/li>\n<li>Identify and protect against reasonably anticipated threats to the security or integrity of the information;<\/li>\n<li>Protect against reasonably anticipated, impermissible uses or disclosures of the information; and<\/li>\n<li>Ensure compliance by their workforce.<\/li>\n<\/ul>\n<p>The Security Rule outlines technical safeguards as security measures that encompass access control, audit controls, integrity controls, and transmission security of ePHI. These technical safeguards, which are described in greater detail below, apply to all forms of ePHI and address not only the technology but also related policies and procedures that protect ePHI and define controls.<\/p>\n<p>The Security Rule requires a covered entity or business associate to comply with the technical safeguard standards, but it does not specify the exact procedures entities must use to protect ePHI. There is some flexibility as to which security measures can be implemented to protect data, but HIPAA\u2019s Security Rule has a few specific requirements for some types of implemented technology. Entities need to be aware of the following safeguards:<\/p>\n<p><strong>Access Control<\/strong>. A covered entity must implement technical policies and procedures that allow only authorized persons to access ePHI. Access control procedures include requirements for unique user identification, access to ePHI during an emergency, termination of an electronic session after a predetermined time of inactivity, and mechanisms to encrypt and decrypt ePHI.<\/p>\n<p><strong>Audit Controls. <\/strong>A covered entity must implement hardware, software, and\/or procedural mechanisms to record and examine access and other activity in information systems that contain or use ePHI.<\/p>\n<p><strong>Integrity Controls. <\/strong>A covered entity must implement policies and procedures to ensure that ePHI is not improperly altered or destroyed. Electronic measures must be put in place to confirm that ePHI has not been improperly altered or destroyed.<\/p>\n<p><strong>Person or Entity Authentication<\/strong>. A covered entity must implement procedures to verify that a person or entity seeking access to ePHI is the one claimed.<\/p>\n<p><strong>Transmission Security.<\/strong> A covered entity must implement technical security measures that guard against unauthorized access to ePHI that is being transmitted over an electronic network, such as the use of encryption that renders ePHI \u201cunreadable, undecipherable or unusable\u201d so any \u201cacquired healthcare or payment information is of no use to an unauthorized third party\u201d.<\/p>\n<h2>Data Encryption Requirements<\/h2>\n<p>The HIPAA Security Rule calls for covered entities and their business associates to implement technical safeguards to protect all ePHI either when stored or transmitted. Specifically, the Security Rule states that ePHI is \u201crendered unusable, unreadable, or indecipherable to unauthorized individuals\u201d if it has been encrypted by \u201cthe use of an algorithmic process to transform data into a form in which there is a low probability of assigning meaning without use of a confidential process or key\u201d (45 CFR 164.304 definition of <em>Encryption<\/em>) and such confidential process or key that might enable decryption has not been breached.\u00a0To avoid a breach of the confidential process or key, these decryption tools should be stored on a device or at a location separate from the data they are used to encrypt or decrypt.\u201d<\/p>\n<p>HIPAA suggests that covered entities and their business associates should follow the policies and practices tested and promulgated by NIST both when ePHI is in transit and at rest:<\/p>\n<p>\u201cValid encryption processes for <strong>data at rest<\/strong> are consistent with <a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-111\/final\" target=\"_blank\" rel=\"noopener\">NIST Special Publication 800-111<\/a>, <em>Guide to Storage Encryption Technologies for End User Devices<\/em>.\u201d<\/p>\n<p>\u201cValid encryption processes for <strong>data in motion<\/strong> are those which comply, as appropriate, with <a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-52\/rev-2\/final\" target=\"_blank\" rel=\"noopener\">NIST Special Publications 800-52<\/a>, G<em>uidelines for the Selection and Use of Transport Layer Security (TLS) Implementations<\/em>; <a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-77\/final\" target=\"_blank\" rel=\"noopener\">SP 800-77<\/a>, <em>Guide to IPsec VPNs<\/em>; or <a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-113\/final\" target=\"_blank\" rel=\"noopener\">SP 800-113<\/a>, <em>Guide to SSL VPNs<\/em>, or others which are <a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/fips\/140\/2\/final\" target=\"_blank\" rel=\"noopener\">Federal Information Processing Standards (FIPS) 140-2<\/a> validated.\u201d<\/p>\n<p>In addition to the above, NIST has published the following publications which aim at securing ePHI:<\/p>\n<p><a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/1800-1\/final\" target=\"_blank\" rel=\"noopener\">NIST SP 1800-1<\/a>, <em>Securing Electronic Health Records on Mobile Devices<\/em>: This NIST Cybersecurity Practice Guide provides a modular, open, end-to-end reference design that can be tailored and implemented by healthcare organizations of varying sizes and information technology (IT) sophistication. Specifically, the guide shows how healthcare providers, using open-source and commercially available tools and technologies that are consistent with cybersecurity standards, can more securely share patient information among caregivers who are using mobile devices.<\/p>\n<p><a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/nistir\/8053\/final\" target=\"_blank\" rel=\"noopener\">NISTIR 8053<\/a>, <em>De-Identification of Personal Information<\/em>: De-identification removes identifying information from a dataset so that individual data cannot be linked with specific individuals. De-identification can reduce the privacy risk associated with collecting, processing, archiving, distributing, or publishing information. De-identification thus attempts to balance the contradictory goals of using and sharing personal information while protecting privacy. The process of de-identification, as it pertains to PHI is <a href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/special-topics\/de-identification\/index.html#rationale\" target=\"_blank\" rel=\"noopener\">described in the HIPAA Privacy Rule<\/a>. It should be noted that once information has been de-identified, it is no longer considered to be PHI.<\/p>\n<h2>Concluding Thoughts<\/h2>\n<p>The healthcare sector has long been a target of cybercriminals. But most recently, as all eyes focused on the coronavirus pandemic spanning the globe, other cybersecurity threats took advantage of the overwhelmed health care system, targeting the technologies so heavily relied upon by healthcare systems and providers.<\/p>\n<p>ITEGRITI helps protect some of the nation\u2019s most critical infrastructure, serving clients in the energy, healthcare, transportation, education, retail and financial sectors.\u00a0 We develop and implement programs that mitigate cyber and compliance risk, supported by internal controls to measure, monitor, and report ongoing program effectiveness. Our programs help companies avoid hacks and minimize business impact during a cybersecurity event. <a href=\"https:\/\/itegriti.com\/kw022024\/contact\/\">Contact our experts<\/a> to learn how ITEGRITI can help your company become HIPAA compliant.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Health Insurance Portability and Accountability Act (HIPAA) and its supporting rules provide a comprehensive framework for safeguarding Protected Health Information. The HIPAA Security Rule becomes even more important as the healthcare sector has become more digitized over the past two years and the attack surface has expanded. Revised and updated for 2022.<\/p>\n","protected":false},"author":10,"featured_media":2199,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2179],"tags":[839],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding the HIPAA Security Rule: What You Need to Know<\/title>\n<meta name=\"description\" content=\"The Health Insurance Portability and Accountability Act (HIPAA) and its supporting rules provide a comprehensive framework for safeguarding Protected Health Information. The HIPAA Security Rule becomes even more important as the healthcare sector has become more digitized over the past two years and the attack surface has expanded. Revised and updated for 2022.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding the HIPAA Security Rule: What You Need to Know\" \/>\n<meta property=\"og:description\" content=\"Healthcare organizations must take proactive steps to establish HIPAA compliant policies and procedures and to implement proper technical safeguards. Revised and updated for 2021.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-07T13:02:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-13T10:03:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Itegirti-HIPAA-Security-Rule.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anastasios Arampatzis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Healthcare organizations must take proactive steps to establish HIPAA compliant policies and procedures and to implement proper technical safeguards. Revised and updated for 2021.\" \/>\n<meta name=\"twitter:creator\" content=\"@TassosAramp\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasios Arampatzis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/\"},\"author\":{\"name\":\"Anastasios Arampatzis\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\"},\"headline\":\"Understanding the HIPAA Security Rule: What You Need to Know\",\"datePublished\":\"2022-02-07T13:02:07+00:00\",\"dateModified\":\"2022-09-13T10:03:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/\"},\"wordCount\":1956,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Itegirti-HIPAA-Security-Rule.jpg\",\"keywords\":[\"8 Minute Read\"],\"articleSection\":[\"Compliance\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/\",\"name\":\"Understanding the HIPAA Security Rule: What You Need to Know\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Itegirti-HIPAA-Security-Rule.jpg\",\"datePublished\":\"2022-02-07T13:02:07+00:00\",\"dateModified\":\"2022-09-13T10:03:29+00:00\",\"description\":\"The Health Insurance Portability and Accountability Act (HIPAA) and its supporting rules provide a comprehensive framework for safeguarding Protected Health Information. The HIPAA Security Rule becomes even more important as the healthcare sector has become more digitized over the past two years and the attack surface has expanded. Revised and updated for 2022.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Itegirti-HIPAA-Security-Rule.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Itegirti-HIPAA-Security-Rule.jpg\",\"width\":800,\"height\":450,\"caption\":\"HIPAA\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding the HIPAA Security Rule: What You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\",\"name\":\"Anastasios Arampatzis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"caption\":\"Anastasios Arampatzis\"},\"description\":\"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.\",\"sameAs\":[\"http:\/\/www.welcometobora.com\",\"https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/\",\"https:\/\/x.com\/TassosAramp\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Understanding the HIPAA Security Rule: What You Need to Know","description":"The Health Insurance Portability and Accountability Act (HIPAA) and its supporting rules provide a comprehensive framework for safeguarding Protected Health Information. The HIPAA Security Rule becomes even more important as the healthcare sector has become more digitized over the past two years and the attack surface has expanded. Revised and updated for 2022.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/","og_locale":"en_US","og_type":"article","og_title":"Understanding the HIPAA Security Rule: What You Need to Know","og_description":"Healthcare organizations must take proactive steps to establish HIPAA compliant policies and procedures and to implement proper technical safeguards. Revised and updated for 2021.","og_url":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2022-02-07T13:02:07+00:00","article_modified_time":"2022-09-13T10:03:29+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Itegirti-HIPAA-Security-Rule.jpg","type":"image\/jpeg"}],"author":"Anastasios Arampatzis","twitter_card":"summary_large_image","twitter_description":"Healthcare organizations must take proactive steps to establish HIPAA compliant policies and procedures and to implement proper technical safeguards. Revised and updated for 2021.","twitter_creator":"@TassosAramp","twitter_site":"@itegriti","twitter_misc":{"Written by":"Anastasios Arampatzis","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/"},"author":{"name":"Anastasios Arampatzis","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673"},"headline":"Understanding the HIPAA Security Rule: What You Need to Know","datePublished":"2022-02-07T13:02:07+00:00","dateModified":"2022-09-13T10:03:29+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/"},"wordCount":1956,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Itegirti-HIPAA-Security-Rule.jpg","keywords":["8 Minute Read"],"articleSection":["Compliance"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/","url":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/","name":"Understanding the HIPAA Security Rule: What You Need to Know","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Itegirti-HIPAA-Security-Rule.jpg","datePublished":"2022-02-07T13:02:07+00:00","dateModified":"2022-09-13T10:03:29+00:00","description":"The Health Insurance Portability and Accountability Act (HIPAA) and its supporting rules provide a comprehensive framework for safeguarding Protected Health Information. The HIPAA Security Rule becomes even more important as the healthcare sector has become more digitized over the past two years and the attack surface has expanded. Revised and updated for 2022.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Itegirti-HIPAA-Security-Rule.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/01\/Itegirti-HIPAA-Security-Rule.jpg","width":800,"height":450,"caption":"HIPAA"},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/understanding-hipaa-security-2-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Understanding the HIPAA Security Rule: What You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673","name":"Anastasios Arampatzis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","caption":"Anastasios Arampatzis"},"description":"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.","sameAs":["http:\/\/www.welcometobora.com","https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/","https:\/\/x.com\/TassosAramp"],"url":"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3152"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=3152"}],"version-history":[{"count":4,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3152\/revisions"}],"predecessor-version":[{"id":3588,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3152\/revisions\/3588"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/2199"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=3152"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=3152"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=3152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}