• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • ATU Home
  • Announcements
  • Facebook
  • Instagram
  • Feedback
  • OIS A-Z
  • Working From Home

Office of Information Systems

Arkansas Tech University

  • Who We Are
    • Mission Statement
    • Our Staff
    • Our Divisions
      • Enterprise Resources Applications and Services
      • Information Security
      • Infrastructure Systems and Services
        • Infrastructure Services
        • Network Services
      • Technology Learning Resources
        • Instructional Technology Services
        • RPL Technology Center
        • Course Management Systems
          • BBLearn Blog
      • Support Services
    • Contact Us
  • What We Offer
    • Resource Summary
    • Computer Labs
    • Software
    • Policies
    • Hardware/Software Purchasing
    • Computer Based Training
    • Unified Communications
  • Solutions
  • Online Support
    • Service Catalog
    • Submit a Ticket
  • Manage Account

HIPPA

HIPAA Security Rules

Health Insurance Portability and Accountability Act

*This document outlines best practice policy and data leakage controls for HIPAA compliance.

HIPAA security rules require all covered entities and business associates to appoint a person or group responsible for a health information security program to protect PHI (Personnel Health Information). This includes a program to analyze and manage risk. Risk analysis, as defined by the HIPAA Security Rule, requires a formal, repeatable methodology that assesses the content, sensitivity and volume of information; the threats to the confidentiality, integrity and availability of PHI; and the effectiveness of the security controls the organization has implemented already.

Organizations must ensure that only authorized users have access to electronic PHI.  This means that only authenticated users with a unique ID should be given access to PHI information.  Whenever possible PHI should be encrypted.  Encrypting PHI helps to protect the data when it is being moved or transported from one location to another on a mobile device.

HIPAA rules require organizations to assess their partners’ practices and obtain contractual guarantees that the information entrusted to them will be protected according to the privacy and security rules.

There are three keys to effective partner management:

  1. Share only the information that partners need to provide their service: Eliminate identity fields if possible, for example.
  2. Regularly assess partners’ risk and security practices.
  3. Establish contracts with partners and review them regularly.

HIPAA regulations state that all HIPAA data that moves across the network should be segmented from all other network traffic to safeguard information against common types of attacks.

Following these practices and guidelines will not only safeguard an organizations Personnel Health Information but will assist in passing HIPAA audits and protect the university from costly penalties in case of a breach.

The following helpful guides to HIPAA Policy Rules and Compliance may be found on the US Department of Health & Human Services website.

  • Summary of the HIPAA Privacy Rule – a more detailed explanation of HIPAA (05-2003).
  • HIPAA Guide for Law Enforcement – a quick and easy explanation of HIPAA (09-2013).
  • Bulletine – HIPAA Privacy in Emergency Situations – an explanation of what is allowed during emergencies (10-2014).

 

 HIPAA and Mobile Data

*This document outlines best practices in mobile policy and data leakage controls for HIPAA compliance.

  1. Any mobile device that contains HIPAA Data should have full drive encryption.
  2. Strong password restrictions should be enforced on these devices.
  3. Any emails sent containing HIPAA data should be encrypted.
  4. The mobile devices operating system should be monitored to verify that the operating system and antivirus are kept patched and up to date.
  5. Device logs should be maintained and audited for unauthorized access.
  6. Device tracking should be enabled.
  7. If possible the ability to remotely lock or wipe that device should be enabled.

Footer

CAMPUS SUPPORT CENTER

RPL 150
(479) 968-0646 (call)
(479) 348-2436 (text)
campussupport@atu.edu

Hours of Operation - Spring 2025
Monday-Wednesday: 7am–10pm
Thursday-Friday: 7am-7pm
Saturday-Sunday: 2pm-6pm

 

Quick Links

  • Blackboard Learn
  • Dell Discounts
  • Equipment Removal
  • Feedback

Quick Links 2

  • InfoSec
  • Solutions
  • Manage Account

Quick Links 3

  • Office 365
  • OneTech
  • Online Training
  • Phishing

Quick Links 4

  • Policies
  • Purchasing
  • Security Awareness
  • Software Request
  • TeamViewer

ATU Logo

© Copyright 2020 Arkansas Tech University · All Rights Reserved · Website Accessibility