When technology workloads process healthcare data, it is important to understand Health Insurance Portability and Accountability Act (HIPAA) compliance and what it means for the technology infrastructure in general and storage in particular. HIPAA is US legislation that was signed into law in 1996.
HIPAA was enacted to protect health insurance coverage, but was later extended to ensure protection and privacy of electronic health records and transactions. In simple terms, it was instituted to modernize the exchange of healthcare information and how the Personally Identifiable Information (PII) that is maintained by the healthcare and healthcare-related industries are safeguarded.
From a technology perspective, one of the core requirements of HIPAA is the protection of Electronic Protected Health Information (ePHIPer through physical, technical, and administrative defenses. From a non-compliance perspective, the Health Information Technology for Economic and Clinical Health Act (HITECH) added protections to HIPAA and increased penalties $100 USD - $50,000 USD per violation. Today, HIPAA-compliant solutions are a norm in the healthcare industry worldwide.
This IBM® Redpaper publication describes HIPPA compliance requirements for storage and how security enhanced software-defined storage is designed to help meet those requirements. We correlate how Software Defined IBM Spectrum® Scale security features address the safeguards that are specified by the HIPAA Security Rule.
Table of contents
- Front cover
- HIPAA compliance and storage
- HIPAA security rules and IBM Spectrum Scale security
- Related publications
- Back cover
- Title: HIPAA Compliance for Healthcare Workloads on IBM Spectrum Scale
- Release date: March 2020
- Publisher(s): IBM Redbooks
- ISBN: 9780738458601
You might also like
Practical Cloud Security
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and …
API Security in Action
API Security in Action teaches you how to create secure APIs for any situation. By following …
Messy code is a nuisance. "Tidying" code, to make it more readable, requires breaking it up …
Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography
Cryptography and encryption aren't just for geeks and spies—they’re also part of our daily lives. This …