A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations

Posted by Varumana- Usha

HIPAA – A Brief Introductory:

The Health Insurance Portability and Accountability Act (HIPAA) privacy and security regulations enacted by the United State Congress, is the Federal Law that applies to the U.S. health care industry. The security regulations stipulate the pro-visions implemented to guard data integrity, confidentiality, and availability. A flexible cryptographic key management solution is proposed to facilitate people in comprehensively understanding the interoperations among the applied cryptographic mechanisms and health information issues because HIPAA has a Centralized Framework.

Privacy Regulations:

Privacy regulations address the patient’s rights to understand and control the use and disclosure of their Protected Health Information (PHI). It also specifies the patient’s rights and the health care provider responsibilities. PHI is directly interrelated with the patient’s privacy. The protection of the PHI is actually the protection of the patient’s privacy.

Security Regulations:

Security regulations can mainly be distinguished by requirement standards and specifications on what to do and how to do it. The provisions regarding administrative, physical, technical and communicative safe guarding are mainly to guard integrity, confidentiality, and availability of health data.

0 comments:

Post a Comment