Welcome!

News Feed Item

Online Tech Cloud Protects PHI With Encryption From Front End to Back Up

Difficult-to-Achieve Aspect of HIPAA Compliance Made Easy With End-to-End Encryption

ANN ARBOR, MI and ORLANDO, FL--(Marketwired - February 23, 2014) - At the HIMSS 2014 Conference this week, healthcare companies are looking for innovations to improve patient outcomes at lower costs. Many of those innovations will come from, or be supported by, new IT strategies. The space is ripe for innovation, from improving user interface designs to fortifying the IT infrastructure protecting patient data.

Online Tech launched an innovative approach to securing patient data by incorporating encryption at the very core of its cloud and backup infrastructure to protect PHI from the front-end of patient portals all the way to the data at rest in offsite disaster recovery environments. This approach means PHI is never in an unencrypted state. Furthermore, "encryption at the core" doesn't incur the performance sacrifices or administrative penalties that 3rd party or "bolted-on" encryption involves.

Online Tech's end-to-end encryption addresses one of the most disturbing discoveries by the OCR: encryption is often completely overlooked or not included at the point of implementation.

"Encrypting patient data throughout its lifecycle is a key strategy for a defense-in-depth approach to HIPAA compliance and protecting PHI. The proliferation of cloud-based healthcare apps and the use of mobile devices by care providers demands new levels of protection. Unfortunately, encryption is not always straightforward or without costs. As such, it remains one of the most widespread areas of non-compliance for healthcare organization," said April Sage, Director Healthcare IT, CPHIMS. "At HIMSS 2014, Online Tech will be a resource to healthcare companies that want to leverage the cloud, without sacrificing data security."

"Online Tech's expertise in HIPAA compliant data centers has been very important for helping CoherentRx build the right foundation for our healthcare apps, which helps doctors communicate more effectively with patients and help patients better understand the care they are receiving," said Tom Hartle, Founder of CoherentRx. "Online Tech has HIPAA expertise and compliant services that help us ensure the security of patient information in our app, and the company's fully redundant infrastructure ensures that our app is always available when doctors need them."

Online Tech will share best practices for addressing these security and compliance challenges in the cloud at HIMSS booth #3904. Throughout the event, Online Tech will have Enterprise Architects available for one-on-one consultations with companies seeking advice and best practices for health IT architecture, compliance strategies and security for PHI. Security and healthcare attorney Tatiana Melnik, will be dropping by the booth to answer questions about compliance in the cloud during HIMSS 2014. Melnik co-presents a HIMSS educational session on February 24 with the IRS' Jim Robnett entitled, "Identity Fraud and Data Breaches: Criminal and Civil Enforcement Efforts."

"One of the key issues facing healthcare CIOs is the security of patient information in from end-to-end. We want to protect PHI from the point of access in the cloud by mobile devices, all the way to its long-term storage destination for disaster recovery protection. Each stage of its lifecycle is a challenge that can lead to non-compliance with HIPAA, making this an urgent issue to resolve," said Mike Klein, co-CEO of Online Tech. "At HIMSS, we will demonstrate how end-to-end encryption solves that non-compliance challenge and keeps confidential patient information secure."

Online Tech will put a spotlight on customer stories during HIMSS, allowing healthcare organizations like CoherentRX, Annkissam and Rimage Designs to tell their stories about protecting PHI and demonstrating compliance with the encryption requirements of HIPAA. This video of instaRounds CEO & Founder Kurian Thott gives a preview of the case studies that Online Tech will highlight at the event.

About Online Tech
Online Tech leads in secure, compliant enterprise-class hosting services. Online Tech's Midwest data centers protect mission critical applications to ensure they are always available, secure, and comply with government & industry regulations. Backed by independent HIPAA, PCI, SOC 2 and Safe Harbor audits, Online Tech delivers exceptional experiences for companies in need of a strategic hosting partner. For more information, call (877) 740-5028, email [email protected] or visit www.onlinetech.com.

Image Available: http://www.marketwire.com/library/MwGo/2014/2/23/11G012681/Images/himss14-1202738089908.jpg

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
Digitization is driving a fundamental change in society that is transforming the way businesses work with their customers, their supply chains and their people. Digital transformation leverages DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations to capitalize on opportunities and create competitive differentiation in the application economy. However, information security has been notably absent from the DevOps movement. Speed doesn’t have to negat...
While DevOps promises a better and tighter integration among an organization’s development and operation teams and transforms an application life cycle into a continual deployment, Chef and Azure together provides a speedy, cost-effective and highly scalable vehicle for realizing the business values of this transformation. In his session at @DevOpsSummit at 19th Cloud Expo, Yung Chou, a Technology Evangelist at Microsoft, will present a unique opportunity to witness how Chef and Azure work tog...
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
Adobe is changing the world though digital experiences. Adobe helps customers develop and deliver high-impact experiences that differentiate brands, build loyalty, and drive revenue across every screen, including smartphones, computers, tablets and TVs. Adobe content solutions are used daily by millions of companies worldwide-from publishers and broadcasters, to enterprises, marketing agencies and household-name brands. Building on its established design leadership, Adobe enables customers not o...
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...