Is Shadow Backup HIPAA Compliant?

The Short Answer:

Shadow Backup complies with the Final Security Rule, but please read on...

Shadow Backup Software compresses and encrypts data before it is sent to the Shadow Backup Server. The Encryption Key is known only to the customer, and is never transmitted to the Server. Data is stored on the Shadow Backup Server in compressed and encrypted archives that are not accessible by the Shadow Backup Administrator.

Shadow Backup Software is adequate to help companies comply with the Final Security Rule. Shadow Backup also complies with the Privacy section, even though Remote Backup Service Providers are not "Covered Entities" as defined by the current rules, and thus are not required to comply with it.

In addition, Shadow Backup can help customers comply with other provisions of the rules as part of a larger data protection and disaster recovery plan. At the time of this writing there is no "HIPAA Compliance" certification for backup software, and it is important to note that under the current rules, no software is truly "HIPAA compliant," because there are no regulations that specifically address backup and privacy software.

The Long Answer:

In 1996, a bill known as the Kennedy-Kassebaum Bill was passed by the U.S. Congress and signed into law by President Bill Clinton. The new law was known as the Health Insurance Portability and Accountability Act of 1996, or more commonly, HIPAA. It had started as a measure to ensure that workers could keep their health insurance when they changed jobs. By the time of its passage, it had become much more complex and far-ranging, affecting the vast majority of all health-care entities in the United States.

Because of the complexity and wide range of HIPAA, there has been and continues to be a great deal of confusion about how it applies to many areas, including Remote Backup Services. This page will present a brief overview of HIPAA, and demonstrate how Shadow Backup can be a valuable tool in meeting the requirements of HIPAA's Security Rule.

Who Must Comply

Those who must comply with HIPAA fall into two categories. The first category is Covered Entities. Covered Entities include all health plans, health care clearinghouses, or health care providers who transmit health information in electronic form.

The second category is the Business Associates of those Covered Entities. A Business Associate is someone who performs certain functions or activities on behalf of, or provides certain services to, a covered entity that involve the use or disclosure of individually identifiable health information. Business associate functions or activities on behalf of a covered entity include claims processing, data analysis, utilization review, and billing.

Business associate services to a covered entity are limited to legal, actuarial, accounting, consulting, data aggregation, management, administrative, accreditation, or financial services.

However, persons or organizations are not considered business associates if their functions or services do not involve the use or disclosure of protected health information (PHI), and where any access to protected health information by such persons would be incidental, if at all.

Must Remote Backup Service Providers Comply?

Remote Backup Service Providers are clearly not Covered Entities.

Because Shadow Backup does not involve the use or disclosure of PHI, and any access to PHI by a Shadow Backup Administrator would be incidental, if even possible, Shadow Backup is not normally considered to be a Business Associate, and is therefore not covered by the HIPAA Privacy Rule. However, a Business Associate Contract is available upon request.

Remote Backup Services do clearly fall within the requirements of the HIPAA Security Rule. Covered Entities must be compliant with the Security Rule by April 21, 2005. Shadow Backup is compliant today, and can provide a foundation for overall compliance.

HIPAA Overview

HIPAA consists of five parts:

  • Title1 - Health Insurance Portability - helps workers maintain insurance coverage when they change jobs
  • Title 2 - Administrative Simplification - standardizes electronic health care-related transactions, and the privacy and security of health information
  • Title 3 - Medical Savings Accounts & Health Insurance Tax Deductions
  • Title 4 - Enforcement of Group Health Plan provisions
  • Title 5 - Revenue Offset Provisions
     

Fortunately, four of the five parts of HIPAA have no bearing on Remote Backup Services. The one part that does apply is Title 2 - Administrative Simplification.

Administrative Simplification

HIPAA Administrative Simplification consists of two areas. The first is commonly referred to as the Transactions and Code Sets Rule, although it also covers standardization of identifiers. This Rule requires standardization in all health-related electronic transactions, such as electronic transmission of insurance claims, verification of insurance, statements, explanations of benefits, remittance advice, etc. It is scheduled to take effect in October 2003.

Remote Backup Services are not a health-related transaction, and are therefore not covered under the Transactions and Code Sets Rule.

The second area of Administrative Simplification is made up of two Rules, the Privacy Rule and the Security Rule. Because these two rules are where the most confusion arises, we will examine them in some detail.

Privacy and Security

Before the Privacy and Security Rules can be explained, we must understand what they are intended to protect. Both Rules are intended to safeguard any health-related information that can be traced to or used to identify an individual. Some examples of this type of information include name, address, Date of Birth, Social Security number, or any other identifier. This type of information is referred to as Protected Health Information, or PHI.

The Privacy Rule and Security Rule are intended to protect PHI in different ways. The Privacy Rule sets out limits on who can have access to PHI and for what purpose. The Security Rule regulates the Procedural, Physical and Technical means that are used to protect PHI.

Privacy

The Privacy Rule places limits on the ways that PHI can be used and disclosed, and requires accounting of disclosures. But it is relevant at this point to review how Shadow Backup works.

With a Shadow Backup, all information to be backed up is encrypted by the local client before being transmitted, using a key that is stored locally. Data is stored on the Shadow Backup Server in its encrypted form. Data can only be recovered by transmitting it back to the local client, which decrypts it, again using the locally-stored key. The most important feature of this arrangement is that while the data is stored on the Shadow Backup Server, it is encrypted and not in a readable format. The Shadow Backup Server does not have access to the key, and without the key, the data cannot be converted to a readable format.

Shadow Backup does not involve the use or disclosure of PHI. All back-up data is stored on the Shadow Backup Server in an encrypted form, and any access to PHI by a Shadow Backup Administrator would be incidental, if even possible. Remote Backup Service Providers are therefore not normally considered to be Business Associates, and are not covered by or required to be compliant with the HIPAA Administrative Simplification Privacy Rule.

Security

The Security Rule is the one part of HIPAA that clearly applies to the type of services that Shadow Backup offers. The Final Security Rule was published in February 2003, and became effective on April 21, 2003. Compliance with this Rule will be required by April 21, 2005.

The Security Rule legislates the means that should be used to protect PHI. It requires that covered entities have appropriate Administrative Procedures, Physical Safeguards, and Technical Safeguards to protect access to PHI.

Examples of appropriate safeguards include:

  • Establishment of clear Access Control policies, procedures, and technology to restrict who has authorized access to PHI.
     
  • Establishment of restricted and locked areas where PHI is stored. 
  • Establishment of appropriate Data Backup, Disaster Recovery, and Emergency Mode Operation planning.
  • Establishment of technical security mechanisms such as encryption to protect data that is transmitted via a network.

Shadow Backup is compliant with the Final Security Rule.

The Shadow Backup client software contains all appropriate technical security mechanisms to protect the data that is transmitted to and from the Shadow Backup Server.

Shadow Backup can form a critical part of Data Backup, Disaster Recovery, and Emergency Mode Operations strategies by providing offsite backup that can be geographically distant from the client site to minimize the likelihood of data loss in a large-scale disaster. In the event of loss of the primary data center, data on a Shadow Backup Server can easily be recovered from any replacement data center.

Covered entities will be required to comply with the HIPAA Administrative Simplification Security Rule by April 21, 2005. Shadow Backup, as part of a comprehensive security plan, can be an important part of compliance strategy.

Links

The Department of Health and Human Services, Centers for Medicare and Medicaid Services HIPAA page can be found here:
http://www.cms.hhs.gov/hipaa/

The most recent summary of the Privacy Rule can be found here:
http://www.hhs.gov/ocr/privacysummary.pdf

The Final Privacy Rule can be found here:
http://www.cms.hhs.gov/hipaa/hipaa2/regulations/privacy/

The Final Security Rule can be found here: http://a257.g.akamaitech.net/7/257/2422/14mar20010800/edocket.access.gpo.gov/2003/pdf/03-3877.pdf

 

Contact Us Today! 919.617.2025. Rest Easy Tonight!