If It Fits, You Must Encrypt (Part II)

June 24, 2011
In a post several months ago (see "If It Fits, You Must Encrypt"), I discussed the Nevada statute that will require Nevada businesses that store or

In a post several months ago (see "If It Fits, You Must Encrypt"), I discussed the Nevada statute that will require Nevada businesses that store or use information of any individual to being encrypting customer information that they send electronically (other than by fax) on October 1, 2008. The movement towards legally required encryption took another step forward last month in Massachusetts.

Massachusetts adopted regulations on September 22 that will require businesses that store or use information about Massachusetts residents, to implement comprehensive information security programs by January 1, 2009. The new regulations make Massachusetts the second state to mandate reasonable security practices for all businesses, after California.

While covered entities subject to the HIPAA Security Rule should have already implemented an information security compliance program, the Massachusetts regulations may raise the bar a bit in certain areas. For example, the Massachusetts regulations require encryption of personal information stored on laptops or transmitted across public or wireless networks. Under the HIPAA Security Rule, encryption of PHI is an "addressable€VbCrLf implementation specification, but is not required.

For healthcare organizations, the new Massachusetts regulations are yet another reason why a comprehensive, formal information security compliance program is highly advisable €¦ and (depending on your business and the states you're operating in) it may be the law.

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...