default logo

HIPAA Compliant Hosting

Overview – The Health Insurance Portability and Accountability Act of 1996 (HIPAA) places a large regulatory burden on organizations that deal with certain types of health-related information. Now, if you’re about to stop reading this and say to yourself “I don’t work for a health-related organization,” stick with me for at least one more paragraph. As HIPAA deals with the security and privacy of health information, it’s of direct importance to database administrators. There are a number of ways you may qualify as a “Covered Entity” that is required to comply with the terms of HIPAA. Some of these are obvious – health care providers come immediately to mind. However, some require a little more thought. If your organization qualifies as a “health plan,” you are considered a Covered Entity. What’s a health plan? It’s any organization that “provides medical care, including items and services paid for as medical care, to employees or their dependents directly or through insurance.” If you offer employees medical care through a self-insured plan, chances are that you’re covered under HIPAA. Other organizations may fall under the “health care clearinghouse” provision based upon their responsibilities for processing health care data. How FCM360’s Products and Services Complies with HIPPA Requirements –

Risk Analysis
  • On-going risk analysis to determine threats and vulnerabilities
Log Management
  • Collect and analyze OS and application log-files
  • Identify security events with regular review of system activity
File Integrity Management
  • Real-Time and continuous management of OS and application files
  • File integrity is insured through real-time monitoring
Network Firewall and VPN
  • First line of defense is insured at the perimeter to keep unauthorized traffic out
  • Facilitate authorised remote access to only administrator
Anti-Virus
  • System protected by anti-virus to detect and remove malware in real-time
  • Data operations as well as sensitive data is protected against malicious activity
Hardware Encrypted Storage
  • Hardware based encryption is provided at the disk level
  • Data theft is protected against for failed or removed disks

 

Contact Us Now

+1 212 319 1717  

[]
1
Step 1

Nameyour full name

Telephonewith country code

MessageHow Can We Help You?

0 /

Previous
Next

Or Contact a Local Expert:

Jubin Pejman – Managing Director – US Sales

For US Sales Email Jubin at: jubin@fcm360.com

Jubin has over 20 years of E-Commerce and application hosting and development experience. In his roles at LTCM, JP Morgan’s Lab Morgan, GFI Group and Check Free Investment Services he built trading applications for some of the world’s largest financial companies. Jubin has helped thousands of organizations with their complex hosting requirements over the past decade.

Peter Heales – Managing Director – EMEA

For EMEA Sales Email Peter at: pheales@fcm360.com

Peter has over 30 years experience in the business. As former head of derivatives operations EMEA at Bear Stearns, European Chairman of the Futures Industry Association and other leadership roles at JP Morgan and ICAP Peter helped numerous clients achieve their goals and run successful operations.


Hide me
Get FCM360 Briefing for Cybersecurity Trends, Advice and How-to-Articles
*First Name: *Last Name: *Email:
Show me