Attending HIMSS in Las Vegas? Make Sure to Check Out Adam Greene’s Session, “HIPAA and a Cloud Computing Shared Security Model”
Cloud computing often involves a shared security model. The cloud service provider (CSP) may provide a virtual vault, but all of its security is meaningless if the customer uses a weak password. When a HIPAA covered entity or business associate, such as a healthcare provider or health plan, uses cloud computing services and seeks to comply with HIPAA’s Security Rule, it is imperative that the covered entity or business associate understand the shared security model, including what requirements are applicable to the covered entity or business associate, what requirements the CSP addresses, and what security responsibilities both must address. Who is responsible for encryption of data at rest? Of data in motion? How does the covered entity or business associate need to address its use of cloud services in its information security risk analysis? This session will focus on how the HIPAA Security Rule and other security laws apply to a cloud computing shared security model.
- Describe what is meant by a “shared security model” in cloud computing
- Identify how to include cloud computing in a HIPAA Security Rule risk analysis
- Categorize which security responsibilities fall to a cloud services provider and which fall to a covered entity or business associate customer in a shared security model
HIMSS18 brings you the world-class education, cutting-edge products and solutions, and unique networking opportunities you need to solve your biggest health information and technology challenges – all at one time, all in one place.
For more information on HIMSS 2018 Conference, please click here.