{"id":20169,"date":"2023-06-29T07:57:19","date_gmt":"2023-06-29T07:57:19","guid":{"rendered":"https:\/\/www.realvnc.com\/en\/?post_type=blog&#038;p=20169"},"modified":"2026-04-13T10:44:25","modified_gmt":"2026-04-13T09:44:25","slug":"hipaa-compliant-remote-access","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/hipaa-compliant-remote-access\/","title":{"rendered":"3 Ways HIPAA-Compliant Remote Access Helps Avoid Violations"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"20169\" class=\"elementor elementor-20169\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-52c19812 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"52c19812\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6f01f2f0\" data-id=\"6f01f2f0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6d132efc elementor-widget elementor-widget-text-editor\" data-id=\"6d132efc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-pm-slice=\"1 1 []\">What is HIPAA?<\/h2><p>The Health Insurance Portability and Accountability Act (HIPAA) was introduced in 1996 to regulate protected health information (PHI) and to make it easier for people to keep their healthcare coverage when changing jobs. Although it was a step in the right direction, the Act was conceived without reference to any specific technologies used to connect to, access, and use patient data.<\/p><p>Subsequently, the Department of Health and Human Services (HHS) implemented the <a href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/index.html#:~:text=The%20HIPAA%20Privacy%20Rule&amp;text=The%20Rule%20requires%20appropriate%20safeguards,information%20without%20an%20individual's%20authorization.\" target=\"_blank\" rel=\"noopener noreferrer\">HIPAA Privacy Rule<\/a> to establish safeguards to protect the use and disclosure of PHI data. And in 2013, HHS developed the <a href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">HIPAA Security Rule<\/a>, which is a set of generic standards to protect electronic PHI (ePHI).\u00a0<\/p><p>Violations of HIPAA are considered to be any violation of the Security, Privacy, or Breach Notification Rules by any type of covered entity listed within HIPAA.<\/p><h2>What Information is Considered PHI?<\/h2><p>There are several types of information that are considered protected health information. They fall into several categories:<\/p><h3>Personal Information<\/h3><p>The 18 personal identifiers covered under the HIPAA Privacy Rule include:<\/p><ul><li><p>Names<\/p><\/li><li><p>Geographic information smaller than the state level<\/p><\/li><li><p>Phone numbers<\/p><\/li><li><p>E-mail addresses<\/p><\/li><li><p>Fax numbers<\/p><\/li><li><p>Social security numbers<\/p><\/li><li><p>Dates (other than year) that relate to an individual&#8217;s health or identity<\/p><\/li><li><p>Vehicle identifiers<\/p><\/li><li><p>Full-face photos<\/p><\/li><li><p>Any other unique identifiers<\/p><\/li><\/ul><h3>Medical Records<\/h3><ul><li><p>Medical record numbers<\/p><\/li><li><p>Health plan beneficiary numbers<\/p><\/li><li><p>Account numbers<\/p><\/li><li><p>Certificate or license numbers<\/p><\/li><li><p>Biometric identifiers<\/p><\/li><\/ul><h3>Digital or Device Data<\/h3><ul><li><p>Device identifiers or serial numbers<\/p><\/li><li><p>IP addresses<\/p><\/li><li><p>Website URLs<\/p><\/li><\/ul><p>But even back in 2013 \u2013 let alone 1996 \u2013 I don&#8217;t think the architects of HIPAA or its Rules had the forethought to conceive that those individuals utilizing ePHI would all be working from the comfort of their own home, on a personal device.\u00a0 It may initially sound like that&#8217;s no big deal, but, as you&#8217;ll see in a moment, it&#8217;s relatively easy to demonstrate a HIPAA violation in scenarios where remote workers are involved due to the following reasons:<\/p><h2>Unsecured Internet Access<\/h2><p>The transmission of ePHI over an insecure network is a violation. Now think about unencrypted Wi-Fi at employees&#8217; homes, at the local coffee shop etc., and you quickly realize how easy it would be for threat actors to access patient data.\u00a0 Remember, the insecure transmission itself is enough to be found in violation; it&#8217;s not necessary that a malicious actor gains access to the ePHI being transmitted.<\/p><h2>Unauthorized Devices<\/h2><p>If a covered entity leverages a web-based application whereby remote users can access ePHI, there are likely no security controls in place to restrict or limit which user devices can connect to the application. HIPAA requires all devices using, gathering, storing, or transferring ePHI to be protected by specific security controls.<\/p><h2>Improper Disposal of Files Containing ePHI<\/h2><p>A remote user working on a file containing ePHI may simply delete the file when done with it. But if it&#8217;s not securely deleted (where the blocks storing the file are overwritten many times to ensure an inability to salvage the file), it&#8217;s relatively easy for a malicious actor to undelete the file.<\/p><h2>Unencrypted Data at Rest<\/h2><p>If data is to remain on a <a href=\"https:\/\/www.realvnc.com\/en\/discover\/remote-device\/\" target=\"_blank\" rel=\"noopener noreferrer\">remote device<\/a>, it&#8217;s required to be encrypted. Now think about, say, a Word doc that contains some patient details; we both know that a regular healthcare user isn&#8217;t going to take steps to ensure that file is encrypted when they&#8217;re done working on it.<\/p><h2>A Lack of Physical Security<\/h2><p>Let&#8217;s face it; the physical security at your employee&#8217;s home doesn&#8217;t involve door badges, security guards, etc. And any kind of attempt to gain access to a remote device is going to be done logically (not physically) via some form of remote control, somewhat bridging the gap here between physical and network security.<\/p><p>One of the challenges that healthcare organizations (and others) have had to address in the last three years was how to ensure remote users could gain access to corporate resources.\u00a0 The cloud made things easy enough, driving users directly to cloud applications, platforms, and data. As did VPNs to connect those same remote users to internal corporate resources.<\/p><p>But little of those answers had anything to do with security; they were about productivity.\u00a0 Today&#8217;s organization that is subject to HIPAA needs to also consider whether any of the violations above are possible with their current configuration (here&#8217;s a hint: if ePHI data is transmitted to a personal device on a WiFi network the organization hasn&#8217;t sanctioned, you&#8217;re likely already in violation).<\/p><p>Enter secure, HIPAA-compliant Remote Access.<\/p><p>Using Secure Remote Access to facilitate a remote worker&#8217;s access to ePHI does a few things to change whether ePHI is technically transmitted and where the ePHI logically exists.<\/p><ul><li><p><strong>It logically keeps the data within the organization<\/strong> \u2013 Whether the remote healthcare professional is accessing ePHI using an application in the cloud or data on the corporate network, by requiring them to first securely access a remote desktop and use that desktop to access the ePHI, the data never leaves the organization and leverages the organization&#8217;s controls to maintain encryption at rest.<\/p><\/li><li><p><strong>No ePHI is transmitted to the remote device<\/strong> \u2013 The only data sent to the remote device serving as the client is screen data; the ePHI safely resides only on the remotely accessed desktop, further keeping ePHI off a user&#8217;s personal device.<\/p><\/li><li><p><strong>The connection is encrypted <\/strong>\u2013 Even when using a completely insecure Wi-Fi network, the <a href=\"https:\/\/www.realvnc.com\/en\/discover\/remote-access\/\" target=\"_blank\" rel=\"noopener noreferrer\">remote access<\/a> session itself is encrypted, ensuring that the ePHI access within the session is, therefore, also encrypted.<\/p><\/li><li><p><strong>The remote access must be authorized<\/strong> \u2013 By requiring multi-factor authentication, it&#8217;s possible to eliminate concerns around physical security (as only the actual owner of a credential can authenticate), as well as logically eliminate the issue of an unauthorized device (as the remote session is a sanctioned session on an internal desktop by an authenticated user.<\/p><\/li><\/ul><p>In the end, by switching to using Secure Remote Access, organizations subject to HIPAA find themselves working in a far more secure environment where the expected violation \u201copportunities\u201d that will (rather than <em>may<\/em>) occur disappear due to the logical shifting of the access to and use of ePHI to an approved desktop remotely accessed by the healthcare employee.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What is HIPAA? The Health Insurance Portability and Accountability Act (HIPAA) was introduced in 1996 to regulate protected health information (PHI) and to make it easier for people to keep their healthcare coverage when changing jobs. Although it was a step in the right direction, the Act was conceived without reference to any specific technologies &#8230; <a title=\"3 Ways HIPAA-Compliant Remote Access Helps Avoid Violations\" class=\"read-more\" href=\"https:\/\/www.realvnc.com\/en\/blog\/hipaa-compliant-remote-access\/\" aria-label=\"Read more about 3 Ways HIPAA-Compliant Remote Access Helps Avoid Violations\">Read more<\/a><\/p>\n","protected":false},"author":16,"featured_media":20172,"template":"","blog_category":[280,266,257],"class_list":["post-20169","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_category-featured","blog_category-healthcare","blog_category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>3 Ways HIPAA-Compliant Remote Access Helps Avoid Violations<\/title>\n<meta name=\"description\" content=\"The surge in remote working and telehealth increases the likelihood of HIPAA breaches \u2013 secure remote access can help.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/hipaa-compliant-remote-access\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 Ways HIPAA-Compliant Remote Access Helps Avoid Violations\" \/>\n<meta property=\"og:description\" content=\"The surge in remote working and telehealth increases the likelihood of HIPAA breaches \u2013 secure remote access can help.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/hipaa-compliant-remote-access\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-13T09:44:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/06\/HIPAA.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1067\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/hipaa-compliant-remote-access\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/hipaa-compliant-remote-access\\\/\"},\"author\":{\"name\":\"Bogdan Bele\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/6fa9f449ba19409f0cd7235931f51987\"},\"headline\":\"3 Ways HIPAA-Compliant Remote Access Helps Avoid Violations\",\"datePublished\":\"2023-06-29T07:57:19+00:00\",\"dateModified\":\"2026-04-13T09:44:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/hipaa-compliant-remote-access\\\/\"},\"wordCount\":1039,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/hipaa-compliant-remote-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/HIPAA.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/hipaa-compliant-remote-access\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/hipaa-compliant-remote-access\\\/\",\"name\":\"3 Ways HIPAA-Compliant Remote Access Helps Avoid Violations\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/hipaa-compliant-remote-access\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/hipaa-compliant-remote-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/HIPAA.jpg\",\"datePublished\":\"2023-06-29T07:57:19+00:00\",\"dateModified\":\"2026-04-13T09:44:25+00:00\",\"description\":\"The surge in remote working and telehealth increases the likelihood of HIPAA breaches \u2013 secure remote access can help.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/hipaa-compliant-remote-access\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/hipaa-compliant-remote-access\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/hipaa-compliant-remote-access\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/HIPAA.jpg\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/HIPAA.jpg\",\"width\":1600,\"height\":1067,\"caption\":\"HIPAA\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/hipaa-compliant-remote-access\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"3 Ways HIPAA-Compliant Remote Access Helps Avoid Violations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/6fa9f449ba19409f0cd7235931f51987\",\"name\":\"Bogdan Bele\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db953d23953822fd0e4cf9ec4b44b151a5712b3d00982d581e2c162042f75c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db953d23953822fd0e4cf9ec4b44b151a5712b3d00982d581e2c162042f75c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db953d23953822fd0e4cf9ec4b44b151a5712b3d00982d581e2c162042f75c3d?s=96&d=mm&r=g\",\"caption\":\"Bogdan Bele\"},\"description\":\"A journalist by formation and experience, and a content writer by trade. I\u2019ve been writing content, both online and offline, for more than 15 years. My focus has always been technology, but I\u2019ve also ventured into fields as diverse as music, football or news. I am RealVNC\u2019s in-house Digital Content Editor, so a lot of what you\u2019re reading on this blog is written by me. I also edit a lot of our content output. When I\u2019m not writing, editing or reading, you\u2019ll probably find me at a concert or watching a Chelsea FC game.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/bogdanbele\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 Ways HIPAA-Compliant Remote Access Helps Avoid Violations","description":"The surge in remote working and telehealth increases the likelihood of HIPAA breaches \u2013 secure remote access can help.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/hipaa-compliant-remote-access\/","og_locale":"en_US","og_type":"article","og_title":"3 Ways HIPAA-Compliant Remote Access Helps Avoid Violations","og_description":"The surge in remote working and telehealth increases the likelihood of HIPAA breaches \u2013 secure remote access can help.","og_url":"https:\/\/www.realvnc.com\/en\/blog\/hipaa-compliant-remote-access\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2026-04-13T09:44:25+00:00","og_image":[{"width":1600,"height":1067,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/06\/HIPAA.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/hipaa-compliant-remote-access\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/hipaa-compliant-remote-access\/"},"author":{"name":"Bogdan Bele","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/6fa9f449ba19409f0cd7235931f51987"},"headline":"3 Ways HIPAA-Compliant Remote Access Helps Avoid Violations","datePublished":"2023-06-29T07:57:19+00:00","dateModified":"2026-04-13T09:44:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/hipaa-compliant-remote-access\/"},"wordCount":1039,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/hipaa-compliant-remote-access\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/06\/HIPAA.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/hipaa-compliant-remote-access\/","url":"https:\/\/www.realvnc.com\/en\/blog\/hipaa-compliant-remote-access\/","name":"3 Ways HIPAA-Compliant Remote Access Helps Avoid Violations","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/hipaa-compliant-remote-access\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/hipaa-compliant-remote-access\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/06\/HIPAA.jpg","datePublished":"2023-06-29T07:57:19+00:00","dateModified":"2026-04-13T09:44:25+00:00","description":"The surge in remote working and telehealth increases the likelihood of HIPAA breaches \u2013 secure remote access can help.","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/hipaa-compliant-remote-access\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/hipaa-compliant-remote-access\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/hipaa-compliant-remote-access\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/06\/HIPAA.jpg","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/06\/HIPAA.jpg","width":1600,"height":1067,"caption":"HIPAA"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/hipaa-compliant-remote-access\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"3 Ways HIPAA-Compliant Remote Access Helps Avoid Violations"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/6fa9f449ba19409f0cd7235931f51987","name":"Bogdan Bele","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/db953d23953822fd0e4cf9ec4b44b151a5712b3d00982d581e2c162042f75c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/db953d23953822fd0e4cf9ec4b44b151a5712b3d00982d581e2c162042f75c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/db953d23953822fd0e4cf9ec4b44b151a5712b3d00982d581e2c162042f75c3d?s=96&d=mm&r=g","caption":"Bogdan Bele"},"description":"A journalist by formation and experience, and a content writer by trade. I\u2019ve been writing content, both online and offline, for more than 15 years. My focus has always been technology, but I\u2019ve also ventured into fields as diverse as music, football or news. I am RealVNC\u2019s in-house Digital Content Editor, so a lot of what you\u2019re reading on this blog is written by me. I also edit a lot of our content output. When I\u2019m not writing, editing or reading, you\u2019ll probably find me at a concert or watching a Chelsea FC game.","sameAs":["https:\/\/www.linkedin.com\/in\/bogdanbele\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/20169","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/16"}],"version-history":[{"count":1,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/20169\/revisions"}],"predecessor-version":[{"id":89924,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/20169\/revisions\/89924"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/20172"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=20169"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=20169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}