HIPAA Software Development
How does Technosoft complies with HIPAA regulations as a vendor?
Technosoft takes HIPAA related security and privacy responsibilities very seriously. Our HIPAA policies and procedures are reviewed by third-party HIPAA experts, periodically. Our HIPAA policies are procedures and routinely communicated to all employees. All new and existing employees go through rigorous HIPAA training. All employee access to PHI is logged and monitored. Special procedures are in place for all System Administrators and Help Desk professionals who usually have direct exposure to PHI. A breach reporting mechanism is in place and is communicated to all employees.
Further details can be acquired by requesting a set of our HIPAA policies and procedures. Anis Siddiqy, our Chief Security and Privacy Officer, will be happy to answer any further question you may have.
What type of HIPAA compliance services are offered by Technosoft?
We design and develop Healthcare software with extensive focus on HIPAA privacy and security compliance. Following are the different levels we provide HIPAA implementation and compliance.
- Employees & Organization Level
- System Physical Security
- Network & Server Security
- Data at Rest Security
- Application Server Security
- Application Client Security, Smart Phone/User Device Level
- Data in Transit Security
If we are a software vendor who never has access to a covered entities PHI, do we still need to sign a BAA? If yes, then why? As we are not directly handling any PHI?
As discussed, you may not need a BAA if you are not providing software maintenance services but you will need to have HIPAA policies in place in case you do get exposed to PHI by mistake.
Consider this example: Your solution is deployed at a client hospital. You do not have access to it at all. They see a bug while providing healthcare services to Patient Samantha. The hospital reports that bug and by mistake mentions the patient’s name to you. That’s a PHI breach. Now how do you deal with that breach? You need to have policies in place to take care of this.
How does HIPAA applies to user's physical activity data such as Walking steps, heart beat rate, sleep quality. We'd like to know how your experience similar projects are and what is your suggestion?
HIPAA applies to covered entities collecting and generating patient healthcare data. Now if you consider yourself a covered entity or a hybrid entity then HIPAA would apply to you. If you just consider yourself collecting your clients’ activity data then HIPAA would not apply to you. Consider this. My iPhone is always collecting my steps count, yet, Apple is not liable to apply HIPAA to the Apple Health application because it’s not a covered entity and it considers step count activity data, not health data. In addition, they specifically mention what they would do with the data collected and get their consent. This is tracking industry norm as of now.
So the example walking steps might not need to be HIPAA compliant, but how about blood pressure, body temperature and HBR? All these are collected by wearable devices. Also how about the personal identification information?
What are the steps to make our software HIPAA compliant?
We can do a GAP analysis of your software offering and provide all the Gaps that need to be filled to become HIPAA compliant. There are some hard core requirements that HIPAA considers “Required” and there are some requirements that HIPAA deems as “Addressable”. The addressable may or may not apply to your particular implementation and your environment. Few areas that are part of must haves are:
- Authentication and Role-Based Authorization.
- PHI Access Logging
- Security of data in transit and at rest
- Emergency Access Procedure
- Audit Controls
- PHI Confidentiality, Availability and Integrity Assurance
- Physical Security of the System
- etc.
What kind of marketing language can we use on our site? e.g. can we say that our software is HIPAA compliant? Or should we say HIPAA friendly etc.
After you have a Gap analysis, changes are made to the software, you have policies and procedures implemented and in place then you can say your software is HIPAA compliant. Saying HIPAA friendly may be legally correct but politically problematic.
What is a typical time estimate for HIPAA review of an existing application?
So for an overall HIPAA consultancy, the following are our rough effort estimates:
A: 2-3 sessions of technology review to do a Gap analysis.
2 x 2-hour session + Prep Time + Findings Documentation = 10 Hours
2 x 1-hour session + Prep Time + Findings Documentation = 6 Hours
B: 5-6 30 minutes consults to get a mutual agreement of HIPAA related directions that are technically and business-wise feasible. = 6 Hours (including documentation support)
C: Email Correspondence and Q&A: 4-5 Hours
D: HIPAA Training to required employees: 1×2 hour session + 30 minutes Q&A= 2.5 Hours
What services do you provide to software companies for their policies and procedure setup?
For Policies and Procedures:
- Technosoft Can help you set up your initial set of Policies and Procedures from our basic set of templates.
- If you already have written Policies and procedures, we can review and modify them as they apply to you.
- Provide consultancy on practicality and applicability of the selected policies.
- Training on those modified policies and procedure.
Do you sign BAAs?
Technosoft has Business Association Agreements in place with many business associations, covered entities/hybrid entities. We have HIPAA policies & procedures in place, we will be happy to execute BAA after review.
How do you manage PHI / HIPAA? If you are working on applications that would normally manage PHI, how do you test and troubleshoot those applications without causing regulatory concerns?
We are Business Associate of a few vendors, so we have required HIPAA policies and procedures in place. We provide periodic training to our developers on HIPAA. Anis Siddiqy, our Chief Security And Privacy Officer, is a HIMSS certified Healthcare Security professional since 2002. And we provide HIPAA training and compliance support to our clients as well. Please see below further FAQs describing different levels of HIPAA compliant/compliance services we offer.
Do you have HIPAA policies and procedures defined for Technosoft and are they communicated to employees?
Technosoft has HIPAA policies and procedures in place for all its employees and subcontractors. These policies are rigorously followed and enforced. Please see section (Technosoft as Vendor) for details.
How does Technosoft ensure system physical security measures for its client deployments?
Our Applications and Data reside on servers that are hosted in the Amazon AWS environment or other third party vendors who provide HIPAA compliant hosting solutions with BAA protection. All these servers are hosted in the special data centers specifically designed for high availability and highly secured Healthcare customers. These servers are physically inaccessible to anyone except the vendor’s employees. Our customers have a Business Associate Agreement in place with Amazon and other vendors. These servers are backed up on a periodic basis. All these servers can be located in a redundant server pool helping our customer provide high availability.
How does Technosoft ensure Network & Server Security measures for its client deployments?
Our solutions are hosted in redundant data centers. And are placed in a private secure subnet accessible only to our customer’s employees only. Except for the HTTP and HTTPS ports (80, 443), all access to this subnet is restricted at the IP level and all remote access to this subnet is logged.
All OS level access is done through RDP/Linux Bastian host. Direct remote OS level access is strictly prohibited except for System updates and patch management. All help desk support is done using a tool that can directly communicate with the OS level. Patches and security updates are updated at regular intervals, depending on the security requirements.
How do you ensure Data at Rest Security?
All our customer’s data are stored in an RDBMS, Relational Database Management System. No direct access to the RDBMS files is allowed except to the system administrator. And all OS level remote access is screen captured. All data stored in the RDBMS is in an encrypted format and all access is controlled through RDBMS’ authentication and authorization mechanism.
How do you ensure Application Server Security?
All access to the database is served through an application server (Tomcat, IIS, etc.). Role-based security is implemented at the application server level and all access is authenticated and authorized using oAuth or other authentication frameworks. All user access is logged in the database. We develop soft configuration options available for each client to select their password strength, auto logout and other addressable features.
Technosoft favors object-based access and layered approach to each action called. Each action, when called, logs user access of that action implicitly.
How do you ensure Application Client Security, Smart Phone/ user device level security?
For clients who have a mobile client application, we have additional security built into the client application to secure data from theft and loss of these movable devices. We develop Android and iOS-based HIPAA compliant m-health applications.
What measures are usually needed to ensure Data in Transit Security required for HIPAAA compliance?
All Technosoft Healthcare application can be deployed over HTTPS, with SSL/TLS encryption.
What options do you have for providing HIPAA compliant software maintenance in the Customer Environment?
We do provide second and third level helpdesk support to our healthcare customers. We have extensive helpdesk support security mechanism and procedures in place. Please contact our privacy officer to request a copy of our HIPAA help desk support procedures.