HIPAA applies to covered entities and their business associates that process or store electronic protected health information (ePHI)
The Health Insurance Portability and Accountability Act of 1996 (HIPAA), public law 104-191, required the Department of Health and Human Services (HHS) to develop regulations protecting the privacy and security of certain health information. In response, HHS published the HIPAA Privacy Rule, the HIPAA Security Rule and certain requirements for breach notification.
The Privacy Rule (45 CFR, Part 160 and Subparts A and E of Part 164), establishes standards for the protection of certain health information (PHI). The Security Rule (45 CFR, Part 160 and Subparts A and C of Part 164) establishes standards for protecting certain health information that is held or transferred in electronic form. The HIPAA Security Rule essentially covers the IT security implementation standards. Another part of HIPAA amended by the HITECH act requires to implement breach notification as specified by 45 CFR, Subpart D of Part 164, and IT department's role is critical in being able to collect all data required to be included in breach notifications to the affected persons, media and the Secretary of HHS.
Action1 helps to address certain HIPAA compliance requirements from the HIPAA Security Rule and breach notification rule by automating your preparedness for audits. The aspects that are covered include sections 164.308 (Administrative Safeguards) and 164.312 (Technical Safeguards).
Sign-up for Action1 Free Edition to receive real-time alerts and view instant data from your endpoints, such as alert on HIPAA Compliance created, deleted or modified or run live or scheduled queries with the ability to export to CSV or Excel. Action1 Endpoint Security Platform is entirely SaaS, with online web interface (no management tools to install) and it has zero cost for basic functionality. Running in the Cloud, Action1 discovers all of your endpoints in seconds and you can query your entire network in plain English.
Endpoint configuration management in the Cloud
Manage endpoint configuration using plain English from the Cloud. Such as type 'Windows services' or 'reboot computer'. Get results instantly from live systems and run automated actions.