Page 40 - Mobile Data Loss
P. 40

34    Mobile Data Loss

           Table 4.3 HIPAA 164.312 Technical Safeguards
           Section                 Requirement
           Access Control          164.312(a)(2)(i)—Unique User Identification
                                   164.312(a)(2)(iii)—Automatic Logoff
                                   164.312(a)(2)(iv)—Encryption and Decryption
                                   164.312(a)(2)(ii)—Emergency Access Procedure (written procedures)
           Audit Controls          164.312(b)—Audit Controls
           Integrity               164.312(c)(1)—Integrity
                                   164.312(c)(2)—Authenticate ePHI
           Authentication          164.312(d)—Person or Entity Authentication
           Transmission Security   164.312(e)(1)—Transmission Security
                                   164.312(e)(2)(i)—Integrity Controls
                                   164.312(e)(2)(ii)—Encryption


             Mobile is well-equipped to meet these requirements. The ease of
          support for certificates, as well as the fundamental application
          sandboxing, provides a great strategy for protecting data-at-rest and
          data-in-motion.

             Containerization is commonly supported on mobile devices today
          to allow separation of health data from personal or nonsensitive data.
          This containerization provides encryption for data-at-rest including
          email and attachments, application data, and content (eg, health
          records). Additionally, data-in-motion is secured through an encrypted
          tunnel, for example an application tunnel or per-App VPN (iOS) with-
          out the need for a VPN.

             Certificates can be used for authentication and automatically
          pushed down to the device for authenticating email, fileshares, content
          access, applications, and secure web access. This inherently provides
          integrity of the device connecting as the device can be validated as a
          sanctioned device. And closed-loop compliance actions provide an
          automated way of quarantining a device that falls out of compliance
          by selectively wiping the health data from the device.



          CJIS

          The Criminal Justice Information Services (CJIS) Security Policy out-
          lines minimum security requirements for information protection. It
          applies to agencies that access “Federal Bureau of Investigation (FBI)
   35   36   37   38   39   40   41   42   43   44   45