OCR Offers Guidance on HIPAA and Cloud Computing

Oct. 7, 2016
The Health & Human Services Office of Civil Rights has provided guidance around several questions regarding cloud service providers and HIPAA.

The Health & Human Services Office of Civil Rights (OCR) has provided guidance around several questions regarding cloud service providers and HIPAA. For instance, if a cloud provider stores only encrypted protected health information and does not have a decryption key, OCR said it is still considered a HIPAA business associate.

OCR refers to cloud service providers (CSPs) storing encrypted PHI as “no-view” services. “As a business associate, a cloud service provider providing no-view services is not exempt from any otherwise applicable requirements of the HIPAA Rules,” OCR said.  “However, the requirements of the Rules are flexible and scalable to take into account the no-view nature of the services provided by the CSP.”

Regarding the HIPAA Security Rule, even when the parties have agreed that the customer is responsible for authenticating access to ePHI, the CSP may still be required to implement appropriate internal controls to assure only authorized access to the administrative tools that manage the resources (e.g., storage, memory, network interfaces, CPUs) critical to the operation of its information systems.  For example, a CSP that is a business associate needs to consider and address, as part of its risk analysis and risk management process, the risks of a malicious actor having unauthorized access to its system’s administrative tools, which could impact system operations and impact the confidentiality, integrity and availability of the customer’s ePHI. 

An exception that would see a provider as only a “conduit” of information is limited to transmission-only services for PHI (whether in electronic or paper form), including any temporary storage of PHI incident to such transmission.  Any access to PHI by a conduit is only transient in nature.  In contrast, a CSP that maintains ePHI for the purpose of storing it will qualify as a business associate, and not a conduit, even if the CSP does not actually view the information, because the entity has more persistent access to the ePHI.

OCR clarified that a CSP is not a business associate if it receives and maintains only information that has been de-identified following the processes required by the Privacy Rule. OCR also noted that if a covered entity (or business associate) uses a CSP to maintain electronic PHI without entering into a business associate agreement, the covered entity (or business associate) is in violation of the HIPAA rules. 

In a statement released by ACT, the App Association, its executive director, Morgan Reed, said that companies that fall under the newly created term, “no-view service provider” will face compliance questions around access which must be resolved. “Of course, further outstanding HIPAA questions remain as well. For example, there is still a lack of clarity around texting and messaging, which are central to patients’ and physicians’ lives. We look forward to working with OCR on these important issues.”

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...