HIPAA Encryption Compliance
The transition from paper to electronic records, as well as increased regulatory pressure, have revolutionized the Healthcare industry with a new challenge: guaranteeing privacy and security of patient data.
Hipaa encryption safeguards the confidentiality of all your sensitive information by protecting data at the source--where it is stored, while addressing the risks of data breaches from lost or stolen computers containing electronic protected health information (ePHI):
- Patient health records: medical reports, lab and clinical data
- Personal patient data: social security, home address, email and phone
- Financial information: billing and insurance-related data
Hipaa data encryption from BestCrypt Base - If any computers or removable drives are lost, don’t worry
Built on Jetico’s superior whole disk encryption, BestCrypt Base provides an ideal solution for any cover entities that need to:
- Protect patient data for HIPAA Compliance
- Overcome pains related to using encryption
- Physically separate encryption keys from stored patient data, as strongly recommended by HHS
Developed on needs learned from the U.S. Healthcare market, BestCrypt Base has been designed to prevent unintended data breaches from lost computers or removable drives while maintaining normal user behavior and productivity as much as possible.
Reliable HIPAA compliant encryption software - encryption keys physically separated from patient data
HIPAA compliance to avoid costly penalties
BestCrypt Base is designed to offer strong encryption while providing peace of mind to anyone concerned with HIPAA compliance. Failure to comply may result in penalties (severe fines, jail), damaged reputation, lost customers, legal fees and other costs.
Easy and transparent for users - Startup / Shutdown same as always
By running transparently in your office, your staff continues working naturally without the need to learn additional computer skills.
Remote Key Storage, as strongly recommended by HHS
As per guidance issued by Health and Human Services (HHS), "To avoid a breach of the confidential process or key, these decryption tools should be stored on a device or at a location separate from the data they are used to encrypt or decrypt."¹
Convenient, affordable solution
BestCrypt Base Key Server runs on an inexpensive disk-less server (under $50) with low system requirements.
Flexibility with adjustable security settings (fixed desktops, servers, moveable laptops)
Admins can select or adjust a desired level of security with a simple click: computers and removable drives can be office-based use only (desktops, servers) or permitted to be brought off network (moveable laptops).
Minimal administration required
Despite its technical strength, BestCrypt Base is still very basic thanks to a simple management console (access control, key back-ups).
Peace of mind from data protection in case of theft or loss
BestCrypt Base utilizes Advanced Encryption Standard (AES) in XTS encryption mode with 256-bit key. Developed by The National Institute of Standards and Technology, AES is the standard encryption technique for both government and commercial use.
¹ U.S. Department of Health & Human Services, Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals, [Online], Available: http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/brguidance.html [14 Feb 2014].
Encryption policy distribution for removable drives
BestCrypt Base v.2 allows administrators to distribute encryption policies for removable storage devices. Encrypted USB drives can be set according to user need:
- Office-based use only
- Permitted to be brought off network
Automatic encryption of removable drives
By setting the encryption policy to be 'office-based use only', no passwords are needed and removable drives are automatically mounted and accessible once plugged in.
Protection against malware injection
Unencrypted removable drives can be blocked from all read/write access; unencrypted drives potentially containing malware cannot be read, preventing infection of the client computer.
Full support for UEFI-based computers
Jetico disk encryption is fully compatible with the latest UEFI-based computers from all known major brands.
Enhanced reporting system
Administrators can gather complete, updated information on the status of each client computer, including key server settings.
Overall performance boost
30% speed increase compared to version 1.0, from updated driver.
Click on the following features for more information:
- Remote Key Storage
- Encryption of All Disks Residing Within the Local Network
- Adjustable Security Settings (Fixed Desktops, Servers, Moveable Laptops)
- Encryption Policy Distribution for Removable Devices
- Easy Installation and Automatic Encryption of Client Computers
- Management Console (Storage, Access Control, Key Back-Ups)
- Dedicated Disk-Less Key Server for Encryption Key
- Encryption Algorithms
Nothing can be used or accessed outside of your ‘Base’... You’re safe!
Talk to us today!