Introduction

<< Click to Display Table of Contents >>

Navigation:  »No topics above this level«

Introduction

Return to chapter overview

TOC:

https://stage.virtualpsychology.com/documentation/toc/index.html

 


 

15-08-2021

* Security Readings:

HIPAA Compliance Checklist - https://www.process.st/hipaa-policies-and-procedures-templates/

What is the HIPAA Security Rule? - https://www.cleardata.com/blog/hipaa-security-rule-standards-and-implementation-specifications/

Patient Privacy and Security of Electronic Medical Information - https://www.radiologyinfo.org/en/info/article-patient-privacy

PRIVACY POLICY AND APA WEBSITE SECURITY - https://pedpsych.org/privacy-policy/

Healthcare IT Security - https://www.medicalwebexperts.com/blog/security/

A Beginner’s Guide to HIPAA Compliant Websites - https://www.fullmedia.com/a-beginners-guide-to-hipaa-compliant-websites

How To Make A Secure HIPAA Compliant Website: 7 Tasks - https://boostmedical.com/hipaa-compliant-website/

Imperva helps health-care organizations safeguard data by:

• Discovering where sensitive data lives—in the cloud and on-premises. The first step in protecting data is knowing where an organization’s

sensitive data is. Automated discovery and classification are the only reliable way to routinely and consistently discover and classify new

or modified database instances containing sensitive data.

• Monitoring data usage activity across a broad range of data stores. While databases are a prime target for criminals, sensitive data exists in

many types of systems–databases, Big Data platforms, SharePoint portals and file stores. And this data lives both in the cloud and on-premises.

• Managing user access. Attackers look for easy opportunities to access sensitive data. They target privileged user accounts, users with excessive

access rights and dormant user accounts. To limit lateral movement of attackers and reduce the risk of data breach, healthcare organizations

must proactively monitor privileged users, identify users who have excessive privileges and deactivate dormant user accounts.

• Masking data in non-production environments. Data masking reduces the attack surface by eliminating sensitive data in non-production

environments. Rather than creating copies of sensitive data for test and development teams or for market research purposes, healthcare

organizations can enable these groups by replacing sensitive data with realistic, fictional data.

Discover Sensitive Data; Monitor Data Usage; Manage User Access; Mask Data.

 

 

14-08-2021

 

GCP - Data Processing and Security Terms (Customers)

https://cloud.google.com/terms/data-processing-terms?_ga=2.87472989.-497859462.1626139662

 

 

06-06-2021

 

HIPAA Jurnal

 

https://www.hipaajournal.com/hipaa-compliance-checklist/

https://www.hipaajournal.com/hipaa-compliance-software/

 

VP provides its users with a HIPAA compliant computing environment.

https://hitinfrastructure.com/features/understanding-hipaa-compliant-cloud-options-for-health-it