For complex topics that regular users would not be interested in. For power users and database administrators.
-
packets
- Posts: 47
- Joined: Sat Jun 18, 2011 12:27 am
- Location: Holly Springs, NC
-
Contact:
Post
by packets » Mon Dec 12, 2011 3:51 am
Here's a little morsel for thought...Do you know if/where CC data is stored and if encrypted in transit and at rest? My experience is Frontdesk workstations get infected with malware the most, and these are the machines which accept CC payments.
71 percent of merchants were found to store unencrypted payment card data in 2011, which is an increase of 8 percent since 2010, according to a study by SecurityMetrics.
http://preview.tinyurl.com/89xss7w
-
jordansparks
- Site Admin
- Posts: 5770
- Joined: Sun Jun 17, 2007 3:59 pm
- Location: Salem, Oregon
-
Contact:
Post
by jordansparks » Mon Dec 12, 2011 11:17 am
If using Open Dental, all the CC numbers are stored on offsite servers and encrypted during transport. We use certified solutions.
-
packets
- Posts: 47
- Joined: Sat Jun 18, 2011 12:27 am
- Location: Holly Springs, NC
-
Contact:
Post
by packets » Tue Dec 13, 2011 4:50 am
jordansparks wrote:If using Open Dental, all the CC numbers are stored on offsite servers and encrypted during transport. We use certified solutions.
And "Certified Solution" means what? As the article suggests with most POS, not much...
Example: Until their latest release, X-charge stored such data (unencrypted) on the local machine (i.e., the X-charge server)...and transmitted it the same. I found this out about 2 year ago because X-charge wouldn't publicly state they were HIPAA/HITECH compliant. Obviously a different measure than PCI DSS. At the time they did tell me this would be resolved in their new release and the data would only then be encrypted, transmitted, and stored on their secure servers (not the local machine). Same issue with most fax solutions BTW.
I still don't find anything "HIPAA/HITECH Compliant" on their site and also no suggestion of offering a Business Associate Agreement (BAA) required for a covered entity. No?
-
DavidWolf
- Posts: 259
- Joined: Tue Jun 19, 2007 9:39 am
- Location: Milford, MA
-
Contact:
Post
by DavidWolf » Wed Dec 21, 2011 12:18 pm
What about unencrypted emails? My understanding of the HIPAA rules are that it is against the rule to email patient information that is unencrypted.
I would assume that if we use the email portion of Open Dental to send out a patient referral or patient statement or any other thing about the patient we are violating the HIPAA rules.
Who is liable for the breach, I would say the dentist.
Is anyone using any kind of disclosure to the patient to get permission to do this?
Even if the patient gives us permission to email them or email a referral to another doctor, is it still a HIPAA violation?
____________
Cheers,
Dave Wolf
-
jordansparks
- Site Admin
- Posts: 5770
- Joined: Sun Jun 17, 2007 3:59 pm
- Location: Salem, Oregon
-
Contact:
Post
by jordansparks » Wed Dec 21, 2011 2:17 pm
Yeah, that's a big problem right now. Very few patients would be able to handle an encrypted email if we sent it to them, so the typical solution that other software tries is a web portal for the patient to check their "email". But then, each patient needs to have a username and password given to them in advance. There is also a big push in EHR right now for the backend communication between offices to get built out. That should be interesting over the next few years.