Home » Compliance


Compliance can be a requirement, especially when your customer says it is. If your customer just will not sign a contract because your network must first be compliant to an industry standard set of rules, call us. We can get your environment fully certified. Not only does it increase the chances you will close the deal, your environment will be more stable and secure because of it.

Information Security Services PhoenixGet certified, we can help your policies and procedures so you become fully certified.

Information Security Services PhoenixThe ISO standard 17799:2000, The Code of Practice for Information Security Management, provides a framework within which organizations can assess the relevance and suitability of Information Security controls.

Information Technolopgy Security Services PhoenixOrganizations are able to benchmark and obtain certification for their security arrangements against ISO17799 to ensure that they are effective and in line with accepted best practice.

Information Security Services PhoenixTriton Technologies provides a range of services to help our clients ensure that their information security practices conform to the ISO17799 standard. Areas that PhoenixSynergy can assist with the effective and pragmatic application of ISO17799 are outlined as follows:

We Follow Generally Accepted Information Security Principles (GAISP)

  • Benchmarking: Assess the status for Information Security management and controls within our client’s organization.
  • Scope Study: Assess the feasibility, costs and timetable for implementing ISO17799.
  • Gap Analysis: Assess existing Information Security arrangements against those recommended in the standard, identification of the weaknesses and development of a ISO17799 implementation plan. Triton Technologies approach is to perform a comprehensive gap analysis of resulting in an action plan for each area of weakness. This report will provide practical advice on how to address any identified weakness.
  • Risk Assessment: Undertake an impact analysis, performing a threat and vulnerability assessment and identifying security controls in line with the principles of ISO17799. This assessment will demonstrate that the selected controls are in line with the principles of ISO17799.
  • Security Improvement: Deliver an Information Security improvement program to achieve and maintain compliance with ISO17799. Assistance with the development and implementation of required controls, policies and procedures.
  • Management: Project and quality management of ISO17799 programs; and
    Education and Training: Security awareness for our client’s staff and training in all aspects of ISO17799.

hipaa compliance training, HIPAA. compliance. health records, HMR, worcester, Providence, Boston


Everyone complains that the HIPAA Security Rule is inconvenient— which it is— but it doesn’t mean you can break the security rules in your medical office any more than you can break security rules at airports, government buildings, and sporting events. Here are a few examples of the HIPAA Security Rule Required and Addressable control that we see medical practices ignoring on a regular basis.

The HIPAA Security Rule’s Implementation Specifications are identified as being Required or Addressable. Addressable specifications are sometimes confused as being Optional, which is not true.

The US Department of Health & Human Services says “a covered entity must implement an addressable implementation specification if it is reasonable and appropriate to do so, and must implement an equivalent alternative if the addressable implementation specification is unreasonable and inappropriate, and there is a reasonable and appropriate alternative.” If you believe that an Addressable specification is not reasonable or appropriate, you must document your decision.

Required HIPAA Controls

These HIPAA controls are firm. The government does not allow any way to avoid them.

The very first requirement in the HIPAA Security Rule. HIPAA doesn’t say much but the Office for Civil Rights (OCR) offers guidance for smaller practices and the National Institute of Standards and Technology (NIST) has a free 95-page guide. Beware… the Meaningful Use Office of the National Coordinator (ONC) says, “It is possible for small practices to do risk analysis themselves using self-help tools. However, doing a thorough and professional risk analysis that will stand up to a compliance review will require expert knowledge that could be obtained through services of an experienced outside professional.”If you want to pass an audit think twice about doing this yourself. Most HIPAA fines are based on a missing, old, or incomplete Risk Analysis.

Many practices stop at the Risk Analysis and put it on the shelf in case of an audit. The HIPAA Security Rule requires you to document the actions you are going to take to reduce your risks or deal with them.

“Establish (and implement as needed) procedures to restore any loss of data.” Think less than more. While common sense says every medical organization and business should have a plan to survive a disaster, the HIPAA Security Rule only cares about access to patient data. Document how you will recover access to your data and you will comply with the HIPAA Security Rule. Document how you will communicate with your staff, work from an alternate site, and operate after a disaster and your organization will survive. It is Important to have a backup plan for both on and off-premise.

The HIPAA Security Rule in 2005 did not give the HIPAA enforcers power to penalize Business Associates for breaches. This all changed with the HIPAA Omnibus Final Rule in 2013. Business Associate Agreements with new wording are required. Covered Entities are liable for the compliance of their Business Associates, and their Business Associates’ subcontractors. Don’t stop with the paperwork. Since you are liable you should validate that your vendors and their vendors actually comply with HIPAA.

While everyone thinks their patient data is housed exclusively in their EHR system, it is all over the place—server folders, laptops, desktop computer hard drives, portable drives, and smartphones. The HIPAA Security Rule requires that access logs be created and stored for six years. To do this your network must be a Domain, not a Workgroup.

Addressable, Not Optional, HIPAA Controls

If you don’t think these are reasonable for your organization, you must identify a suitable alternative and document the reasons for your decision. Ignoring Addressable controls is a HIPAA Security Rule violation and is likely to cause a reportable data breach.

Encryption = No Data Breach. With all the reported data breaches why this isn’t Required by the HIPAA Security Rule is beyond me. Encrypting data is not expensive and a device with encrypted data that is lost or stolen is not reportable. Recently Advocate Health Care in Chicago had four computers stolen and breached 4 million records. An Omnicell technician had his laptop stolen and breached 68,000 records. Would you rather pay millions of dollars to notify patients and pay fines or a lot less to encrypt your devices? Don’t stop at laptops—encrypt everything from thumb drives to servers.

No shared logins and passwords are allowed by the HIPAA Security Rule — none. All systems that provide access to electronic Protected Health Information (ePHI) must be able to track users and what files they create, access, and modify. This includes IT staff and outsourced IT providers that access systems housing patient information.

“This is so inconvenient!”
“It slows our doctors down!”
“It’s such a pain to keep logging in!”

We have to deal with it since the alternatives are pretty ugly and expensive to keep patients from having access to an unlocked computer with access to patient records. You could leave the patients in the waiting room while the doctor waits for them in the examining room. You could hire ‘watchers’ to sit in each examining room all day to ensure that patients don’t touch the computer. Be reasonable. Automatic logoff/lockout is far easier and much less expensive. This also extends to remote sessions from home.

Bottom Line With HIPAA Security

Our advice is to consider all HIPAA Security Rule Implementation Specifications Required. You will be compliant, more secure, and reduce the risk of a reportable data breach, millions of dollars in costs, and tons of grief.

For more information on HIPAA Compliance call 866-304-4300

Let your business soar, contact us to get your rocket.