Friday, June 21, 2024
HomeHealth LawIs Your Web site HIPAA-Compliant? | HIPAA & Well being Data Expertise

Is Your Web site HIPAA-Compliant? | HIPAA & Well being Data Expertise

If you’re a HIPAA-covered entity or enterprise affiliate, you probably know that affected person PHI could solely be created, acquired, maintained, and transmitted as permitted by the HIPAA Safety Rule and the HIPAA Privateness Rule.  But it’s possible you’ll not have targeted in your firm’s web site as a spot the place PHI is collected and transmitted.  If you’re topic to HIPAA, you need to frequently assess your web site information practices.  As described on this weblog put up, you need to ensure third-party trackers like Meta Pixel usually are not accessing and disclosing information behind the scenes.  However widespread customer-facing instruments shouldn’t be missed.  Widespread methods wherein PHI could also be collected and transmitted embody:

  • Dwell Chat
  • Affected person Portals
  • On-line Affected person Varieties
  • On-line Scheduling Instruments
  • Evaluations and Testimonials
  • E mail
  • On-line loyalty Applications

The HIPAA Privateness Rule requires that entities that create, obtain, preserve, and/or transmit PHI take particular measures to guard it. For instance, if your organization retains individually identifiable medical data on a server, that server have to be encrypted and safe. Transmitting PHI consists of sending data through e-mail, textual content, internet kinds or different kinds of digital messaging. Storing PHI consists of storing data in apps, information facilities, and so on. If your organization web site collects, shops, or transmits PHI and doesn’t take cheap measures to safe that information, it might violate HIPAA.

To start remediating dangers, firms ought to:

  • Buy and implement an SSL certificates for the corporate web site
  • Guarantee all internet kinds on the corporate web site are encrypted and safe
  • Solely ship emails containing PHI by means of encrypted e-mail servers
  • Associate with internet hosting firms which might be HIPAA-compliant and have processes for shielding PHI
  • Execute BAAs with third events which have entry to PHI (together with internet hosting firms)
  • Be sure that PHI is barely accessible by approved people inside your organization


Please enter your comment!
Please enter your name here

Most Popular

Recent Comments