Welcome!

News Feed Item

Online Tech Cloud Protects PHI With Encryption From Front End to Back Up

Difficult-to-Achieve Aspect of HIPAA Compliance Made Easy With End-to-End Encryption

ANN ARBOR, MI and ORLANDO, FL--(Marketwired - February 23, 2014) - At the HIMSS 2014 Conference this week, healthcare companies are looking for innovations to improve patient outcomes at lower costs. Many of those innovations will come from, or be supported by, new IT strategies. The space is ripe for innovation, from improving user interface designs to fortifying the IT infrastructure protecting patient data.

Online Tech launched an innovative approach to securing patient data by incorporating encryption at the very core of its cloud and backup infrastructure to protect PHI from the front-end of patient portals all the way to the data at rest in offsite disaster recovery environments. This approach means PHI is never in an unencrypted state. Furthermore, "encryption at the core" doesn't incur the performance sacrifices or administrative penalties that 3rd party or "bolted-on" encryption involves.

Online Tech's end-to-end encryption addresses one of the most disturbing discoveries by the OCR: encryption is often completely overlooked or not included at the point of implementation.

"Encrypting patient data throughout its lifecycle is a key strategy for a defense-in-depth approach to HIPAA compliance and protecting PHI. The proliferation of cloud-based healthcare apps and the use of mobile devices by care providers demands new levels of protection. Unfortunately, encryption is not always straightforward or without costs. As such, it remains one of the most widespread areas of non-compliance for healthcare organization," said April Sage, Director Healthcare IT, CPHIMS. "At HIMSS 2014, Online Tech will be a resource to healthcare companies that want to leverage the cloud, without sacrificing data security."

"Online Tech's expertise in HIPAA compliant data centers has been very important for helping CoherentRx build the right foundation for our healthcare apps, which helps doctors communicate more effectively with patients and help patients better understand the care they are receiving," said Tom Hartle, Founder of CoherentRx. "Online Tech has HIPAA expertise and compliant services that help us ensure the security of patient information in our app, and the company's fully redundant infrastructure ensures that our app is always available when doctors need them."

Online Tech will share best practices for addressing these security and compliance challenges in the cloud at HIMSS booth #3904. Throughout the event, Online Tech will have Enterprise Architects available for one-on-one consultations with companies seeking advice and best practices for health IT architecture, compliance strategies and security for PHI. Security and healthcare attorney Tatiana Melnik, will be dropping by the booth to answer questions about compliance in the cloud during HIMSS 2014. Melnik co-presents a HIMSS educational session on February 24 with the IRS' Jim Robnett entitled, "Identity Fraud and Data Breaches: Criminal and Civil Enforcement Efforts."

"One of the key issues facing healthcare CIOs is the security of patient information in from end-to-end. We want to protect PHI from the point of access in the cloud by mobile devices, all the way to its long-term storage destination for disaster recovery protection. Each stage of its lifecycle is a challenge that can lead to non-compliance with HIPAA, making this an urgent issue to resolve," said Mike Klein, co-CEO of Online Tech. "At HIMSS, we will demonstrate how end-to-end encryption solves that non-compliance challenge and keeps confidential patient information secure."

Online Tech will put a spotlight on customer stories during HIMSS, allowing healthcare organizations like CoherentRX, Annkissam and Rimage Designs to tell their stories about protecting PHI and demonstrating compliance with the encryption requirements of HIPAA. This video of instaRounds CEO & Founder Kurian Thott gives a preview of the case studies that Online Tech will highlight at the event.

About Online Tech
Online Tech leads in secure, compliant enterprise-class hosting services. Online Tech's Midwest data centers protect mission critical applications to ensure they are always available, secure, and comply with government & industry regulations. Backed by independent HIPAA, PCI, SOC 2 and Safe Harbor audits, Online Tech delivers exceptional experiences for companies in need of a strategic hosting partner. For more information, call (877) 740-5028, email [email protected] or visit www.onlinetech.com.

Image Available: http://www.marketwire.com/library/MwGo/2014/2/23/11G012681/Images/himss14-1202738089908.jpg

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
"MathFreeOn.com is a line coding platform for engineers and scientists. When they want to solve an engineering problem and they have to use software - they have to pay a lot of money for licenses - but with MathFreeOn you don't have to pay a lot of money. Just go to our site and write the code and you can check the result right away," explained Simon Lee, CMO of MathFreeOn, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Cla...
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal...
Video experiences should be unique and exciting! But that doesn’t mean you need to patch all the pieces yourself. Users demand rich and engaging experiences and new ways to connect with you. But creating robust video applications at scale can be complicated, time-consuming and expensive. In his session at @ThingsExpo, Zohar Babin, Vice President of Platform, Ecosystem and Community at Kaltura, discussed how VPaaS enables you to move fast, creating scalable video experiences that reach your aud...
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
President Obama recently announced the launch of a new national awareness campaign to "encourage more Americans to move beyond passwords – adding an extra layer of security like a fingerprint or codes sent to your cellphone." The shift from single passwords to multi-factor authentication couldn’t be timelier or more strategic. This session will focus on why passwords alone are no longer effective, and why the time to act is now. In his session at 19th Cloud Expo, Chris Webber, security strateg...
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"We are a leader in the market space called network visibility solutions - it enables monitoring tools and Big Data analysis to access the data and be able to see the performance," explained Shay Morag, VP of Sales and Marketing at Niagara Networks, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smart...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, discussed recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model for s...
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.