The Health Insurance Portability and Accountability Act of 1996 (HIPAA). Public law 104-191, sets the standards for protecting patient data. Specifically, if you are transmitting any patient data over the internet it should be viewable only by the invited participants.
"Dead Simple Screen Sharing" achieves this by going above and beyond traditional screen sharing and audio/video conferencing solutions, by hosting the entire software application on your server and by encrypting the transmitting data. So, DeadSimple does not even have access to the encrypted patient health information.
In the Self-Host plan, your data can be hosted on your personal servers or on any of the cloud service providers with only your organisation having access keys to it.
All the data that we transmit is AES 256 bit encrypted.
How DeadSimple Enables HIPAA Compliance.
|Access Control Standard (§ 164.312(a)(1)):
Implement technical policies and procedures that allow only authorized persons to access electronic protected health information (e-PHI)
With, DeadSimple only people with authorization can access and conduct Screen Sharing and Audio calls with invited participants and only invited participants can access the data.
|Audit Control Standard (§ 164.312(b)):
Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information.
|DeadSimpleScreenSharing can record the sessions and keep them in a safe and encrypted cloud storage. You can also schedule automatic backups and schedule backups with DeadSimple.|
|Integrity Standard (§ 164.312(c)(1))
Implement policies and procedures to protect electronic protected health information from improper alteration or destruction.
|DeadSimpleScreenSharing has proper logging mechanisms in place, along with proper security logins and scheduled database backups ensures that there is no improper alteration or destruction of electronic Patient Health Information.|
|Transmission Control Standard (§ 164.312(e)(1)):
Implement technical security measures to guard against unauthorized access to electronic protected health information that is being transmitted over an electronic communications network.
|DeadSimpleScreenSharing has state of the art systems and protections in place, rendering it one of the most difficult software systems to hack or gain unauthorised access to.|