A2 CyberSecurity I Information Security Compliance

HIPAA Information Compliance

HIPAA Information Privacy

Maintaining data confidentiality of PHI is required for all organizations that store, process or transmit protected health information.

The HIPAA information privacy law was enacted in 1996 by the US congress to protect confidentiality and integrity of patient health information.

Who We Serve

We offer HIPAA compliance and to small to mid-size healthcare institutions in order to maintain data confidentiality, data integrity, data availability of PHI.

The Health Insurance Portability and Accountability Act was enacted by the U.S. Congress in 1996. HIPAA is designed to protect the use and disclosure of individual health information and other PHI. The HITECH was enacted under Title XIII of the American Recovery and Reinvestment Act of 2009 and expands upon HIPAA data privacy procedures.

HIPAA and HITECH Objectives

HIPAA main directive involves securing PHI data ( Protected Health Information ) when it is in use, in transit, or at rest. HITECH act of 2009 expands upon HIPAA and includes procedures and requirements for data breach disclosures, as well as addressing and establishing additional data regulations. The basic idea of HIPAA is that an individual who is a subject of individually identifiable health information should have:

  • Established procedures for the exercise of individual health information privacy rights.
  • The use and disclosure of individual health information should be authorized or required.

How Can We Help You Achive HIPAA Compliance?

A2 Cybersecurity offers a wide range of information security services to help you protect and safeguard protected health information, data confidentiality, data integrity and data availibility assurance.

Services Included in our Managed Security Service Platform that cover HIPAA Privacy:

  • Network vulnerability risk management - Risk Management is important to ensure that your network is safe from the low-hanging-fruit that automated hostile attacks most commonly search and exploit. Risk management helps safeguard data integrity and confidentiality, by preventing unauthorized access to sensitive data.
  • Network vulnerability risk management and removal ensure that your network is safe from the low-hanging-fruit that script kiddies and automated hostile attacks most commonly look for. Risk management helps safeguard data integrity and confidentiality, by preventing unauthorized access to sensitive data.
  • Instrusion Detection and Data Audit Trails - Intrusion detection systems cover traffic endpoint monitoring while traffic audit trails monitor and log access and modification of sensitive PHI data.
  • Tripwire Data Integrity Safeguard - Using sophisticated cryptographic hashing algorithims, a2 cybersecurity deploys automated file "tripwire" systems to monitor the integrity of PHI. We used the opensource utility RADMIND as well as commercial tripwire monitoring systems.


Want more technical details?

Read our service walkthroughs for more information.






Reliable Network Services

Network Stability Support

Leverage redundant ISP connections, continious monitoring, and dedicated support for assured network reliability.

Information Security

Protect sensitive assets at every level of your organization through our defense-in-depth security platform.

Compliance Protection

Easily maintain information security compliance and regulation with our team of certified security analysts.

A2 Cybersecurity

1.888.600.6389

146 South Liberty - Stony Point, New York I Some Rights Reserved I Privacy Policy