Home

/

Features

Features

By accessing our website, you are agreeing to be bound by these terms of service, all applicable laws and regulations.

HipaaChecker Features

UNIQUE USER ID TRACKING

PHI EMERGENCY ACCESS

SESSION MANAGEMENT

ENCRYPTION AND DECRYPTION

PREVENT UNAUTHORIZED PHI ALTERATION AND DESTRUCTION

INTEGRITY CONTROLS OVER TRANSMISSION

PHI ENCRYPTION

ACCESS CONTROL

arrow-down

ENCRYPTION (Addressable) - § 164.312(e)(2)(ii)

Sample questions to consider for reasonable and appropriate PHI safeguard with strong encryption:

  • How does the organization transmit EPHI?

  • How often does the organization transmit EPHI?

  • Based on the risk analysis, is encryption needed to protect EPHI during transmission?

  • What methods of encryption will be used to protect the transmission of EPHI?

HIPAAChecker to Secure PHI Transmission with Appropriate Encryption

In addition to ENCRYPTION AND DECRYPTION, HIPAAChecker identifies the following PHI encryption methods for strong data transmission protection:

PHI ENCODING: Identify whether to implement Base64 or Other Encoding methods

PHI DECODING: Identify whether to implement Base64 or Other Decoding methods

Realm Database: Check whether a mobile application implements Realm Database. If implemented, does it satisfy security requirements such as Data at Rest, Data at Transit, Authentication and Authorization, Data Integrity, etc?

SQL Cipher: If an application uses an SQLite database, it must implement SQLCipher. SQLCipher provides 256-bit AES encryption to SQLite database files. HIPAAChecker identifies vulnerabilities in SQLite database file encryption.

Certify and Protect Your

Apps

with

HIPAAChecker