Features
By accessing our website, you are agreeing to be bound by these terms of service, all applicable laws and regulations.
HipaaChecker Features
UNIQUE USER ID TRACKING
PHI EMERGENCY ACCESS
SESSION MANAGEMENT
ENCRYPTION AND DECRYPTION
PREVENT UNAUTHORIZED PHI ALTERATION AND DESTRUCTION
INTEGRITY CONTROLS OVER TRANSMISSION
PHI ENCRYPTION
ACCESS CONTROL
ENCRYPTION (Addressable) - § 164.312(e)(2)(ii)
Sample questions to consider for reasonable and appropriate PHI safeguard with strong encryption:
How does the organization transmit EPHI?
How often does the organization transmit EPHI?
Based on the risk analysis, is encryption needed to protect EPHI during transmission?
What methods of encryption will be used to protect the transmission of EPHI?
In addition to ENCRYPTION AND DECRYPTION, HIPAAChecker identifies the following PHI encryption methods for strong data transmission protection:
PHI ENCODING: Identify whether to implement Base64 or Other Encoding methods
PHI DECODING: Identify whether to implement Base64 or Other Decoding methods
Realm Database: Check whether a mobile application implements Realm Database. If implemented, does it satisfy security requirements such as Data at Rest, Data at Transit, Authentication and Authorization, Data Integrity, etc?
SQL Cipher: If an application uses an SQLite database, it must implement SQLCipher. SQLCipher provides 256-bit AES encryption to SQLite database files. HIPAAChecker identifies vulnerabilities in SQLite database file encryption.