RealVNC logomark

RealVNC Viewer

Productivity

icon close circle

3 Ways HIPAA-Compliant Remote Access Helps Avoid Violations

Contents

What is HIPAA?

The Health Insurance Portability and Accountability Act (HIPAA) was introduced in 1996 to regulate protected health information (PHI) and to make it easier for people to keep their healthcare coverage when changing jobs. Although it was a step in the right direction, the Act was conceived without reference to any specific technologies used to connect to, access, and use patient data.

Subsequently, the Department of Health and Human Services (HHS) implemented the HIPAA Privacy Rule to establish safeguards to protect the use and disclosure of PHI data. And in 2013, HHS developed the HIPAA Security Rule, which is a set of generic standards to protect electronic PHI (ePHI). 

Violations of HIPAA are considered to be any violation of the Security, Privacy, or Breach Notification Rules by any type of covered entity listed within HIPAA.

What Information is Considered PHI?

There are several types of information that are considered protected health information. They fall into several categories:

Personal Information

The 18 personal identifiers covered under the HIPAA Privacy Rule include:

  • Names

  • Geographic information smaller than the state level

  • Phone numbers

  • E-mail addresses

  • Fax numbers

  • Social security numbers

  • Dates (other than year) that relate to an individual’s health or identity

  • Vehicle identifiers

  • Full-face photos

  • Any other unique identifiers

Medical Records

  • Medical record numbers

  • Health plan beneficiary numbers

  • Account numbers

  • Certificate or license numbers

  • Biometric identifiers

Digital or Device Data

  • Device identifiers or serial numbers

  • IP addresses

  • Website URLs

But even back in 2013 – let alone 1996 – I don’t think the architects of HIPAA or its Rules had the forethought to conceive that those individuals utilizing ePHI would all be working from the comfort of their own home, on a personal device.  It may initially sound like that’s no big deal, but, as you’ll see in a moment, it’s relatively easy to demonstrate a HIPAA violation in scenarios where remote workers are involved due to the following reasons:

Unsecured Internet Access

The transmission of ePHI over an insecure network is a violation. Now think about unencrypted Wi-Fi at employees’ homes, at the local coffee shop etc., and you quickly realize how easy it would be for threat actors to access patient data.  Remember, the insecure transmission itself is enough to be found in violation; it’s not necessary that a malicious actor gains access to the ePHI being transmitted.

Unauthorized Devices

If a covered entity leverages a web-based application whereby remote users can access ePHI, there are likely no security controls in place to restrict or limit which user devices can connect to the application. HIPAA requires all devices using, gathering, storing, or transferring ePHI to be protected by specific security controls.

Improper Disposal of Files Containing ePHI

A remote user working on a file containing ePHI may simply delete the file when done with it. But if it’s not securely deleted (where the blocks storing the file are overwritten many times to ensure an inability to salvage the file), it’s relatively easy for a malicious actor to undelete the file.

Unencrypted Data at Rest

If data is to remain on a remote device, it’s required to be encrypted. Now think about, say, a Word doc that contains some patient details; we both know that a regular healthcare user isn’t going to take steps to ensure that file is encrypted when they’re done working on it.

A Lack of Physical Security

Let’s face it; the physical security at your employee’s home doesn’t involve door badges, security guards, etc. And any kind of attempt to gain access to a remote device is going to be done logically (not physically) via some form of remote control, somewhat bridging the gap here between physical and network security.

One of the challenges that healthcare organizations (and others) have had to address in the last three years was how to ensure remote users could gain access to corporate resources.  The cloud made things easy enough, driving users directly to cloud applications, platforms, and data. As did VPNs to connect those same remote users to internal corporate resources.

But little of those answers had anything to do with security; they were about productivity.  Today’s organization that is subject to HIPAA needs to also consider whether any of the violations above are possible with their current configuration (here’s a hint: if ePHI data is transmitted to a personal device on a WiFi network the organization hasn’t sanctioned, you’re likely already in violation).

Enter secure, HIPAA-compliant Remote Access.

Using Secure Remote Access to facilitate a remote worker’s access to ePHI does a few things to change whether ePHI is technically transmitted and where the ePHI logically exists.

  • It logically keeps the data within the organization – Whether the remote healthcare professional is accessing ePHI using an application in the cloud or data on the corporate network, by requiring them to first securely access a remote desktop and use that desktop to access the ePHI, the data never leaves the organization and leverages the organization’s controls to maintain encryption at rest.

  • No ePHI is transmitted to the remote device – The only data sent to the remote device serving as the client is screen data; the ePHI safely resides only on the remotely accessed desktop, further keeping ePHI off a user’s personal device.

  • The connection is encrypted – Even when using a completely insecure Wi-Fi network, the remote access session itself is encrypted, ensuring that the ePHI access within the session is, therefore, also encrypted.

  • The remote access must be authorized – By requiring multi-factor authentication, it’s possible to eliminate concerns around physical security (as only the actual owner of a credential can authenticate), as well as logically eliminate the issue of an unauthorized device (as the remote session is a sanctioned session on an internal desktop by an authenticated user.

In the end, by switching to using Secure Remote Access, organizations subject to HIPAA find themselves working in a far more secure environment where the expected violation “opportunities” that will (rather than may) occur disappear due to the logical shifting of the access to and use of ePHI to an approved desktop remotely accessed by the healthcare employee.

Learn more on this topic

Measuring DevOps success sounds simple - until teams chase the wrong metrics. Learn which KPIs actually matter, where leaders slip,...
Aligning IT with business goals sounds simple - until priorities, budgets, and execution collide. Here’s how leaders close the gap...
Business continuity planning for IT leaders sounds simple - until a single outage tests every assumption. Is your strategy ready...

Try RealVNC® Connect today for free

No credit card required for 14 days of free, secure and fast access to your devices. Upgrade or cancel anytime