{"id":6,"date":"2012-05-09T00:13:08","date_gmt":"2012-05-09T00:13:08","guid":{"rendered":"http:\/\/www.dynapass.com\/blog\/?p=6"},"modified":"2015-10-27T16:53:19","modified_gmt":"2015-10-27T16:53:19","slug":"achieve-hipaa-compliance-with-dynapass-out-of-band-authentication","status":"publish","type":"post","link":"http:\/\/www.dynapass.com\/blog\/2012\/05\/achieve-hipaa-compliance-with-dynapass-out-of-band-authentication\/","title":{"rendered":"Achieve HIPAA Compliance with DynaPass Out of Band Authentication"},"content":{"rendered":"<p>By David Tran on May 29th, 2012<\/p>\n<p><a href=\"http:\/\/www.dynapass.com\/blog\/wp-content\/uploads\/2012\/05\/hipaa-compliance1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-18\" title=\"hipaa-compliance\" alt=\"\" src=\"http:\/\/www.dynapass.com\/blog\/wp-content\/uploads\/2012\/05\/hipaa-compliance1-252x300.jpg\" width=\"151\" height=\"180\" srcset=\"http:\/\/www.dynapass.com\/blog\/wp-content\/uploads\/2012\/05\/hipaa-compliance1-252x300.jpg 252w, http:\/\/www.dynapass.com\/blog\/wp-content\/uploads\/2012\/05\/hipaa-compliance1-863x1024.jpg 863w\" sizes=\"auto, (max-width: 151px) 100vw, 151px\" \/><\/a><\/p>\n<p>The United States Congress introduced the Health Insurance Portability and Accountability Act (HIPAA) of 1996 to address the need for security standards and to protect the confidentiality and integrity of private health information.\u00a0 HIPAA affects health care organizations by requiring mechanisms to be put in place to control the privacy and security of sensitive patient data stored and exchanged electronically.\u00a0 HIPAA also affects health care organizations by encouraging the conversion of traditional paper based health care information systems to electronic health care information systems through a standardization of all shared electronic information to make healthcare more effective and efficient.\u00a0 HIPAA also mandates that the design and implementation of these electronic health care information systems protect the privacy and security of individuals\u2019 health information.\u00a0 HIPAA X12 standards, version 5010, is a new standard that regulates the electronic transmission of specific health transactions.\u00a0 Entities that need to conform to HIPAA are health plans, health care clearinghouses and any health care providers that transmit health information in electronic form.\u00a0 The compliance date for use of these new HIPAA X12, version 5010, standards is January 1, 2012.\u00a0 The HIPPA Act of 1996 required the Secretary of the U.S. Department of Health and Human Services (HHS) to develop rules known as the HIPAA Privacy Rule and the HIPAA Security Rule. \u00a0Within the U.S. Department of Health and Human Services (HHS), the Office of Civil Rights (OCR) is responsible for implementing and enforcing the privacy and security rules.<\/p>\n<p><strong>HIPAA Privacy Rule <\/strong><\/p>\n<p>The HIPAA Privacy Rule establishes a set of national standards to protect medical records and sensitive health information.\u00a0 This rule addresses the use and disclosure of individuals\u2019 protected health information (PHI) by organizations subject to the privacy rule.\u00a0 An increasing number of organizations are utilizing new forms of health information technologies (HIT) which usually involves the transition of PHI from paper to electronic form.\u00a0 A major purpose of the privacy rule is to define and limit how organizations can use or disclose PHI.\u00a0 Under the privacy rule, organizations must develop and implement policies and procedures that restrict and limit access of health information based on specific roles of members of the organization\u2019s workforce and they must limit uses and disclosures of the information to the minimum necessary to accomplish their intended purpose.\u00a0 Many health care providers are adopting electronic health records (EHRs) to enhance the effectiveness and efficiency of the health care they deliver.\u00a0 The privacy rule became effective on April 14, 2001 and most health plans and health care providers had to comply with its requirements by April 2003.<\/p>\n<p><strong>HIPAA Security Rule<\/strong><\/p>\n<p>The HIPAA Security Rule is a set of national standards that protects medical records and sensitive health information that is held or transferred in electronic form.\u00a0 One of the major goals of the security rule is to protect the privacy of health information of individuals while allowing organizations covered in HIPAA to adapt to new technologies to improve the quality and efficiency of health care. \u00a0The security rule requires covered entities to maintain appropriate administrative, technical and physical safeguards for protecting electronic protected health information (e-PHI).\u00a0 Under the security rule, organizations must ensure the confidentiality, integrity and availability of all e-PHI that they create, receive, maintain and transmit.\u00a0 Organizations must be able to identify and protect against anticipated threats to the security of the information and also protect against impermissible uses or disclosures of this information.\u00a0 Organizations must also ensure sure that e-PHI is not able to be accessed by unauthorized persons and that their workforce ensures compliance.\u00a0 Identifying and protecting against anticipated threats and uses is also a requirement by the security rule that organizations must follow.\u00a0 The security rule became effective on February 20, 2003 and most health plans and health care providers had until April 2005 to comply with its requirements.<\/p>\n<p><strong>DynaPass<\/strong><strong>\u00ae<\/strong><strong>Out of Band Authentication Technology (U.S. Patent #6,993,658)<\/strong><\/p>\n<p>DynaPass\u2019\u00ae patented out-of-band authentication method while generating a one-time password (OTP) utilizes a user\u2019s mobile device as a way to authenticate them.\u00a0 This works by sending an OTP over SMS to a user\u2019s mobile device.\u00a0 \u00a0By leveraging DynaPass\u2019\u00ae out of band authentication platform, members of an organization\u2019s workforce can authenticate themselves before accessing protected health information and preventing unauthorized users from accessing it.\u00a0 An organization can also limit access of these members by assigning limitations depending on their roles within the organization and it will prevent unauthorized users from accessing the information.<\/p>\n<p>Traditional methods of accessing health care data remotely such as using a login and password can be easily compromised by phishing attacks, malware and man in the middle attacks (MITM).\u00a0 Health care organizations can combat these attacks by utilizing <a title=\"Two Factor Authentication Services\" href=\"http:\/\/www.dynapass.com\/two-factor-authentication.php\" target=\"_blank\">two factor authentication<\/a>, also called strong authentication, along with DynaPass\u2019\u00ae out of band authentication to authenticate users and block unauthorized users trying to access this health information.\u00a0 By combining login credentials along with DynaPass\u2019\u00ae out of band authentication platform, organizations can add another layer of security to protect against attacks and data breaches.\u00a0 A user is authenticated by entering in their login credentials within an online portal and through a secure centralized server on a separate channel, in which an OTP is generated and sent to the user\u2019s mobile device which is a true method of two factor authentication.\u00a0 By using two factors to authenticate a user, something that a user knows (login credentials) and something that a user has (mobile device), we believe that unauthorized access to health information will be reduced, and organizations will be able to more confidently and securely store and access their health information in electronic form.<\/p>\n<p>We believe that two-factor authentication is an effective way for health care organizations to protect their health information and prevent attacks because even if one layer of security (login and password) is compromised by an attacker, the second layer of security (OTP sent to mobile device) would stop the authentication process and prevent access to the information.\u00a0\u00a0 Organizations that are converting from paper based health care information systems to electronic health care information systems need to make sure that their electronic health records information remain safe and that there are safeguards in place to control access to this information.<\/p>\n<p>DynaPass\u2019\u00ae out-of-band authentication platform meets and exceeds the requirements of HIPAA by incorporating two-factor authentication while utilizing out of band authentication in a cost efficient way. We believe that DynaPass\u00ae out-of-band authentication is an effective layered security process that controls security access and is easy to use. \u00a0By using a mobile device as an authentication device, such as a mobile phone which the majority of the organization\u2019s workforce already has, users can utilize two-factor authentication without needing to carry additional hardware tokens to authenticate themselves and organizations can save on costs to implement security devices.\u00a0 Users do not need to download any additional applications on the mobile devices since DynaPass\u2019\u00ae OTP platform uses the SMS system to send the one time password and is a \u201czero footprint solution.\u201d We believe that DynaPass\u2019\u00ae out-of-band authentication is the patented, cost effective two factor authentication solution that can ensure that organizations comply with HIPAA standards while also protecting sensitive health information.<\/p>\n<p><a href=\"http:\/\/www.dynapass.com\/two-factor-authentication.php\">See DynaPass Two-Factor Authentication<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By David Tran on May 29th, 2012 The United States Congress introduced the Health Insurance Portability and Accountability Act (HIPAA) of 1996 to address the need for security standards and to protect the confidentiality and integrity of private health information.\u00a0 HIPAA affects health care organizations by requiring mechanisms to be put in place to control [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[7,10,8,9],"class_list":["post-6","post","type-post","status-publish","format-standard","hentry","category-out-of-band-authentication","tag-hipaa","tag-one-time-password","tag-privacy-rule","tag-two-factor-authentication-2"],"_links":{"self":[{"href":"http:\/\/www.dynapass.com\/blog\/wp-json\/wp\/v2\/posts\/6","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.dynapass.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.dynapass.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.dynapass.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.dynapass.com\/blog\/wp-json\/wp\/v2\/comments?post=6"}],"version-history":[{"count":21,"href":"http:\/\/www.dynapass.com\/blog\/wp-json\/wp\/v2\/posts\/6\/revisions"}],"predecessor-version":[{"id":146,"href":"http:\/\/www.dynapass.com\/blog\/wp-json\/wp\/v2\/posts\/6\/revisions\/146"}],"wp:attachment":[{"href":"http:\/\/www.dynapass.com\/blog\/wp-json\/wp\/v2\/media?parent=6"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.dynapass.com\/blog\/wp-json\/wp\/v2\/categories?post=6"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.dynapass.com\/blog\/wp-json\/wp\/v2\/tags?post=6"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}