HIPAA AND ONLINE BACKUP WHAT YOU NEED TO KNOW ABOUT

Similar documents
HIPAA Compliance Guide

HIPAA BUSINESS ASSOCIATE AGREEMENT BEST PRACTICES: A COMPLIANCE SOLUTION FOR THE TICKING CLOCK AND THE DRACONIAN CIVIL AND CRIMINAL PENALTIES

MEMORANDUM. Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

HIPAA Privacy & Security. Transportation Providers 2017

The HIPAA Omnibus Rule and the Enhanced Civil Fine and Criminal Penalty Regime

Auditing for HIPAA Compliance: Evaluating security and privacy compliance in an organization that provides health insurance benefits to employees

Determining Whether You Are a Business Associate

AFTER THE OMNIBUS RULE

HIPAA BUSINESS ASSOCIATE AGREEMENT BEST PRACTICES KURTIN PLLC COMPLIANCE SOLUTION: UPDATE January 3, I. Executive Summary.

"HIPAA RULES AND COMPLIANCE"

The Impact of Final Omnibus HIPAA/HITECH Rules. Presented by Eileen Coyne Clark Niki McCoy September 19, 2013

True or False? HIPAA Update: Avoiding Penalties. Preliminaries. Kim C. Stanger IHCA (7/15)

HIPAA Training. HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel

HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES

The Privacy Rule. Health insurance Portability & Accountability Act

2016 Business Associate Workforce Member HIPAA Training Handbook

HIPAA in the Digital Age. Anisa Kelley and Rachel Procopio Maryan Rawls Law Group Fairfax, Virginia

8/14/2013. HIPAA Privacy & Security 2013 Omnibus Final Rule update. Highlights from Final Rules January 25, 2013

H E A L T H C A R E L A W U P D A T E

HIPAA Compliance for Business Associates ISBA Health Law Symposium October 10, 2017

ARE YOU HIP WITH HIPAA?

Saturday, April 28 Medical Ethics: HIPAA Privacy and Security Rules

LEGAL ISSUES IN HEALTH IT SECURITY

Key Legal Issues in EMR, EMR Subsidy and HIPAA and Privacy Click Issues to edit Master title style

HIPAA & The Medical Practice

DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION)

HIPAA Data Breach ITPC

HIPAA Omnibus Rule. Critical Changes for Providers Presented by Susan A. Miller, JD. Hosted by

Business Associates: How to become HIPAA compliant, increase revenue, and gain new clients

Industry leading Education. Certified Partner Program. Please ask questions Todays slides are available group.

HIPAA PRIVACY AND SECURITY RULES APPLY TO YOU! ARE YOU COMPLYING? RHODE ISLAND INTERLOCAL TRUST LINN F. FREEDMAN, ESQ. JANUARY 29, 2015.

Texas Health and Safety Code, Chapter 181 Medical Records Privacy Law, HB 300

HIPAA AND YOU 2017 G E R A L D E MELTZER, MD MSHA

HIPAA Background and History

Understanding Cyber Risk in the Dental Office. Melissa Moore Sanchez, CIC

HIPAA 102a. Presented by Jack Kolk President ACR 2 Solutions, Inc.

HIPAA PRIVACY AND SECURITY AWARENESS

2011 Miller Johnson. All rights reserved. 1. HIPAA Compliance: Privacy and Security Changes under HITECH HITECH. What is HITECH? Mary V.

HIPAA HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT

OMNIBUS RULE ARRIVES

HIPAA Overview Health Insurance Portability and Accountability Act. Premier Senior Marketing, Inc

Meaningful Use Requirement for HIPAA Security Risk Assessment

NOTIFICATION OF PRIVACY AND SECURITY BREACHES

Business Associate Risk

HIPAA Update. Jamie Sorley U.S. Department of Health and Human Services Office for Civil Rights

HITECH and HIPAA: Highlights for Health Departments. Aimee Wall UNC School of Government

Interpreters Associates Inc. Division of Intérpretes Brasil

HEALTHCARE BREACH TRIAGE

What Brown County employees need to know about the Federal legislation entitled the Health Insurance Portability and Accountability Act of 1996.

HEALTH & HUMAN SERVICES OFFICE FOR CIVIL RIGHTS HIPAA COMPLIANCE AUDITS. What do I need to know?

HIPAA & HITECH Privacy & Security. Volunteer Annual Review 2017

HIPAA Privacy, Breach, & Security Rules

Privacy Rule Primer. 45 CFR Part 160 and Subparts A and E of Part CFR , 45 CFR CFR

503 SURVIVING A HIPAA BREACH INVESTIGATION

Disclaimer LEGAL ISSUES IN PHYSICAL THERAPY

HIPAA 2014: Recent Changes from HITECH and the Omnibus Rule. Association of Corporate Counsel Houston Chapter October 14, 2014.

HIPAA COMPLIANCE. for Small & Mid-Size Practices

Business Associate Agreement

AMA Practice Management Center, What you need to know about the new health privacy and security requirements

HIPAA PRIVACY REQUIREMENTS. Dana L. Thrasher Robert S. Ellerbrock, III Constangy, Brooks & Smith, LLP

HIPAA Basic Training for Health & Welfare Plan Administrators

6/7/2018. HIPAA Compliance Simplified. HHS Wall of Shame. Marc Haskelson, President Compliancy Group

HIPAA PRIVACY REQUIREMENTS. Dana L. Thrasher Constangy, Brooks & Smith, LLP (205)

Presented by Marti Arvin Chief Compliance Officer UCLA Health Sciences

HIPAA and Lawyers: Your stakes have just been raised

HIPAA: Final Omnibus Rule is Here Arizona Society for Healthcare Risk Managers November 15, 2013

ALERT. November 20, 2009

HIPAA / HITECH. Ed Massey Affiliated Marketing Group

HIPAA BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATES AND SUBCONTRACTORS

Fifth National HIPAA Summit West

HIPAA The Health Insurance Portability and Accountability Act of 1996

HIPAA Compliance Under the Magnifying Glass

New. To comply with HIPAA notice requirements, all Providence covered entities shall follow, at a minimum, the specifications described below.

HIPAA THE NEW RULES. Highlights of the major changes under the Omnibus Rule

How to mitigate risks, liabilities and costs of data breach of health information by third parties

Effective Date: 4/3/17

Omnibus Rule: HIPAA 2.0 for Law Firms

PATTERSON MEDICAL SUPPLY, INC. HIPAA BUSINESS ASSOCIATE AGREEMENT WITH CUSTOMERS

1 Security 101 for Covered Entities

HIPAA Privacy Overview

GUIDANCE ON HIPAA & CLOUD COMPUTING

Conduct of covered entity or business associate. Did not know and, by exercising reasonable diligence, would not have known of the violation

UNDERSTANDING HIPAA & THE HITECH ACT. Heather Deixler, Esq. Associate, Morgan, Lewis & Bockius LLP

HIPAA: Impact on Corporate Compliance

Assessing and Mitigating Risk Under the HIPAA Omnibus Rule

Assessing and Mitigating Risk Under the HIPAA Omnibus Rule

March 1. HIPAA Privacy Policy

Texas Tech University Health Sciences Center El Paso HIPAA Privacy Policies

Preparing for a HIPAA Audit & Hot Topics in Health Care Reform

Getting a Grip on HIPAA

Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule

The Audits are coming!

HIPAA Privacy and Security Rules

H 7789 S T A T E O F R H O D E I S L A N D

RIGHT TO ACCESS AND SECURITY RISK ANALYSIS. K a t h r y n A y e r s W i c k e n h a u s e r, M B A, C H P C, C H T S

HIPAA Security How secure and compliant are you from this 5 letter word?

Coping with, and Taking Advantage of, HIPAA s New Rules!! Deven McGraw Director, Health Privacy Project April 19, 2013!

Texas Tech University Health Sciences Center HIPAA Privacy Policies

Legal and Privacy Implications of the HIPAA Final Omnibus Rule

Business Associate Agreement Health Insurance Portability and Accountability Act (HIPAA)

Transcription:

WHAT YOU NEED TO KNOW ABOUT HIPAA AND ONLINE BACKUP Learn more about how KeepItSafe can help to reduce costs, save time, and provide compliance for online backup, disaster recovery-as-a-service, mobile data protection, and cloud SaaS backup contact us today. 888 965 9988 sales@keepitsafe.com

TABLE OF CONTENTS What You Need to Know About HIPAA and Online Backup Background: What is HIPAA? What Constitutes PHI? Who is Responsible for Safeguarding PHI? The High Cost of a HIPAA Violation Still Not Convinced You Need a Backup Solution That Addresses HIPAA? How to Find a HIPAA-Compliant Data Backup Solution Conclusion: Now is the Time for a Backup Solution that Meets HIPAA Standards pg. 3 pg. 5 pg. 6 pg. 7 pg. 8 pg. 10 pg. 11 pg. 14 2

WHAT YOU NEED TO KNOW ABOUT HIPAA AND ONLINE BACKUP Whether you re a healthcare provider, health plan or a non-healthcare business that deals with patients private medical data called electronic protected health information, or ephi your company falls under the complex and aggressively enforced federal HIPAA law. And if even you ve already taken steps to safeguard this sensitive data when your staff transmits it, you must keep in mind that HIPAA also places strict requirements on how you store and back up any ephi under your care. Understanding these backup requirements, and deploying the right solution to back up your ephi, can help keep you on the right side of HIPAA s enforcers, save you from the law s steep fines for violations, and even prevent the public damage your business s reputation can suffer as the result of just one mistake. A Health-Data Backup Horror Story When he placed a set of his company s backup tapes in his car for transport, the employee of Science Applications International Corp. (SAIC) had no idea that this routine action would lead to the largest breach of patient health data ever reported by the Department of Health and Human Services. Nor could he know then that this simple mistake would expose his company to a nearly $5 billion class-action lawsuit from the millions of patients it affected. But those backup tapes which contained unencrypted ephi under the care of SAIC, a subcontractor for the US military s health system TRICARE were stolen from the employee s car. The breach affected all of those TRICARE patients who received treatment at a specific medical facility in the decade between 1992 and 2011 a total of 4.9 million active and retired personnel and their family members. 3

Lessons from this Horror Story The number of missteps in the true story above is greater than it might seem at first. So before we delve into a discussion of HIPAA and its strict guidelines governing the backup of electronic protected health information, here s a quick recap of where SAIC (and TRICARE) ran afoul of HIPAA: 1. The Ability to Meet Recovery Time Objectives (RTOs) HIPAA s Security Rule (45 C.F.R 164.306, in case you re wondering), requires a Covered Entity or Business Associate establish physical measures, policies and procedures to protect the business s electronic information systems and related buildings and equipment from, among other things, unauthorized intrusion. Clearly, allowing patient ephi to be stored on backup tapes that are then carried to an employee s car fall short of this requirement. 2. They failed to comply with encryption requirements. Remember, the ephi on the stolen backup tapes was also unencrypted, in violation of section 13402(h) of the HITECH Act, a 2009 expansion to federal healthcare law. This section demands that ephi must be either encrypted or destroyed to ensure its security at all times. 3. They took too long to notify those patients affected. Another component of HIPAA compliance involves the Covered Entity s breach-notification procedures. The HIPAA Notification Rule (45 C.F.R. 164.400-414, in case you re wondering) requires Covered Entities and their Business Associates to provide notification following a breach of unsecured protected health information. The notification requirements are deadline-specific and wide-reaching: Covered Entities must notify affected individuals within 90 days of a breach, for example, provide media notification within 60 days, and notify the HHS Secretary within 60 days. The SAIC-TRICARE lawsuit argued the businesses did not meet these deadlines. 4

4. They failed to meet their shared responsibility as a BA. Finally, it s worth pointing out that as a subcontractor to the military s health system TRICARE, SAIC was acting as a Business Associate defined as a third party working with a HIPAA Covered Entity (in this case, TRICARE), which deals with ephi on behalf of that Covered Entity as part of its business relationship. SAIC was collecting and storing ephi as a TRICARE contractor, and as a result, they had a shared responsibility to protect that patient data. As a result of this failure to properly back up the ephi under their charge, SAIC exposed both itself and TRICARE to HIPAA regulators and the class-action lawsuit that followed. BACKGROUND: WHAT IS HIPAA? Passed by Congress in 1996, the Health Insurance Portability and Accountability Act (HIPAA) is a federal law enacted to protect the security and confidentiality of patients personal medical data called protected health information, or PHI. Here is a brief list of the specific objectives of the HIPAA law in it original format: 1. To increase the security and portability of patient records 2. To provide the ability to securely and easily transfer a patient s health insurance seamlessly from one plan to another 3. To reduce health fraud and abuse 4. To establish mandated, industry-wide standards for electronic billing of medical records 5. To require the protection and confidential handling of protected health information (PHI), whether in hardcopy or electronic formats HIPAA enforcement has continually strengthened since its passage 20 years ago, and the law itself has expanded in scope. The HITECH Act was enacted in 2009, for example, to give federal regulators more authority to address the rapidly expanding use of electronically based protected health information (ephi). Then in 2013, HHS published its Final Omnibus Rule, which expanded regulators oversight of patient information to include any vendor (called a Business Associate ) that creates, receives, maintains or transmits PHI on behalf of Covered Entity such as a healthcare provider or health plan. 5

WHAT CONSTITUTES PHI? Protected health information (PHI) refers to any personally identifiable data relating to the physical or mental health of an individual, the provision of healthcare services for that individual, or the payment for healthcare services on behalf of an individual. These pieces of data could include: Patient name Patient address Patient birthdate Patient Social Security Number Medical records Medical billing details Any other information that can be used to identify a specific person This is why HIPAA s oversight reaches well beyond healthcare providers and health plans clearly, many third parties that play an integral role in patient health also handle ephi. In other words, if you re wondering whether your organization falls under HIPAA s oversight and enforcement, it probably does. To be sure, though, let s review the wide range of entities that share responsibility as Covered Entities (CEs) or Business Associates (BAs) for protecting patients protected health information. 6

WHO IS RESPONSIBLE FOR SAFEGUARDING PHI? Businesses with regulatory responsibility for safeguarding the ephi they deal with fall under two categories: Covered Entities and Business Associates: Covered Entities (CEs) Healthcare Providers: Doctors, clinics, hospitals, pharmacies, psychologists, nursing homes and dentists any healthcare entity that deals with ephi. Health Plans: Health insurers, HMOs, company health plans and certain government entities that pay for healthcare, such as Medicare and Medicaid. Healthcare Clearinghouses: Entities that process nonstandard health information from another entity into standard format (for example, into an electronic form.) Business Associates (BAs) This would include all of the non-healthcare businesses contractors, subcontractors or third-party vendors working with Covered Entities that must handle, store or transmit ephi as part of their standard business practices. Like the CEs they work with, these BAs share the responsibility for the security of the ephi under their charge, and as a result they re regulated by HIPAA. Examples of BAs include medical billing companies, businesses that administer health plans, lawyers, accountants, IT consultants, and businesses that store, back up or destroy patient records for CEs. KeepItSafe would qualify as a Business Associate because we securely backup ephi for our healthcare customers. And we sign a Business Associate Agreement (BAA) as part of our standard practice when helping a HIPAA-regulated healthcare business back up its patient data. Remember: The 2013 Final Omnibus Rule, published by the HHS, expanded the Privacy Rule s definition of a Business Associate to include any vendors that create, receive, maintain or transmit PHI on behalf of a Covered Entity. 7

THE HIGH COST OF A HIPAA VIOLATION To give you an idea of the monetary costs of making just a single mistake in terms of how a Covered Entity or its Business Association, have a look at the table below, published by the American Medical Association and addressing failure to comply with HIPAA (Section 42 USC 1320d-5): HIPAA Violation Minimum Penalty Maximum Penalty Individual did not know (and by exercising reasonable diligence would not have known) that he/she violated HIPAA $100 per violation, with an annual maximum of $25,000 for repeat violations (Note: maximum that can be imposed by State Attorneys General regardless of the type of violation) $50,000 per violation, with an annual maximum of $1.5 million HIPAA violation due to reasonable cause and not due to willful neglect $1,000 per violation, with an annual maximum of $100,000 for repeat violations $50,000 per violation, with an annual maximum of $1.5 million HIPAA violation due to willful neglect but violation is corrected within the required time period $10,000 per violation, with an annual maximum of $250,000 for repeat violations $50,000 per violation, with an annual maximum of $1.5 million HIPAA violation is due to willful neglect and is not corrected $50,000 per violation, with an annual maximum of $1.5 million $50,000 per violation, with an annual maximum of $1.5 million Source: American Medical Association. A single HIPAA violation can cost a Covered Entity $50,000 per occurrence and in cases where each occurrence impacts many people, that per-occurrence penalty can reach $1.5 million in fines annually. 8

A Costly HIPAA Backup Violation Consider this real-world example of how a mishandling of ephi backup can lead to a huge fine not to mention the negative publicity of reports about your patients private medical data being stolen. In 2010, Massachusetts-based South Shore Hospital shipped three boxes of backup tapes (nearly 500 tapes in all) to Archive Data Solutions, to have the tapes wiped clean of their data unencrypted ephi on 800,000 patients. Turns out only one of the three boxes made it to Archive Data Solutions. The other two, containing hundreds of thousands of unencrypted patient records, went missing. According to the Massachusetts Attorney General, South Shore Hospital failed to securely back up its ephi, failed to inform Archive Data Solutions about the sensitive nature of the data it was receiving, failed to put in place a Business Associate Agreement (BAA) with Archive Data, and failed to determine first whether or not Archive Data had the proper safeguards in place at its facilities before shipping ephi to the company. All told, South Shore Hospital paid $750,000 in fines for these HIPAA violations. Another Costly HIPAA Violation In 2013, Illinois-based Advocate Medical Group suffered a break-in at its facility and thieves took off with four laptop computers containing the Social Security numbers and other ephi of more than four million people. This qualified at the time as second-largest health-related data breach ever. According to the lawsuit filed by affected patients against the healthcare organization, Advocate Medical s laptops were unencrypted and stolen from an unmonitored room with little or no security to prevent unauthorized access. Note: The security and HIPAA-violation implications of this laptop-theft incident underscore the need for any Covered Entity or Business Associate to deploy a companywide solution for Mobile Device Management, such as the one available from KeepItSafe Mobile. 9

STILL NOT CONVINCED YOU NEED A BACKUP SOLUTION THAT ADDRESSES HIPAA? Perhaps you need further convincing that your company s data backup solution must take HIPAA s regulations into account, assuming you ever deal directly with PHI. If so, please read the excerpts below from an article published by the Healthcare Billing & Management Association a 30-year trade association whose members today are responsible for nearly 80% of all third-party medical-billing claims in the country. In its feature, The Truth About HIPAA-HITECH and Data Backup, the association warns its medical-billing members (all BAs, regulated by HIPAA): It s not optional - All CEs, including medical practices and BAs, must securely back up retrievable exact copies of electronic protected health information (CFR 164.308(7)(ii) (A)). Your data must be recoverable - Why else are you backing it up? You must be able to fully restore any loss of data (CFR 164.308(7)(ii). You must get your data offsite - as required by the HIPAA Security Final Rule (CFR 164.308(a)(1)). How could one defend a data backup and disaster recovery plan that stored backup copies of ephi in the same location as the original data store? You must back up your data frequently - as required by the HIPAA Security Final Rule (CFR 164.308(a)(1)). In today s real-time transactional world, a server crash, database corruption, or erasure of data by a disgruntled employee at 4:40 PM would result in a significant data loss event if one had to recover from yesterday s data backup. Finally, the piece points out: Non-compliance penalties are severe - Penalties are increased significantly in the new tiered Civil Monetary Penalty (CMP) System with a maximum penalty of $1.5 million for all violations of an identical provision. 10

HOW TO FIND A HIPAA-COMPLIANT DATA BACKUP SOLUTION Many online backup provider claim their processes meet HIPAA standards. And when it comes to certain guidelines and clauses, they might be. But be careful the HIPAA Security Rule demands that a Covered Entity have a backup plan that meets all of HIPAA s criteria. When choosing a data backup solution that will protect your ephi and meet HIPAA s requirements, you will need to judge that solution against HIPAA s mandates regarding: 1. Offsite Data Backup You ll need your backup stored offsite, at physical locations other than your primary facilities. (45 C.F.R. 164.308) 2. Encryption You ll need to keep your at-rest ephi data encrypted at all times or destroy it to ensure its security. (Section 13402(h) of Title XIII of the HITECH Act) 3. Technical Safeguards You ll need to employ sufficient technology, and the policies and procedures for its use, to protect your ephi and control access to it. (45 C.F.R. 164.306) 4. Physical Safeguards You ll need to implement physical measures, policies and procedures to protect your electronic information systems and related buildings and equipment, from natural and environmental hazards and unauthorized intrusion. (45 C.F.R. 164.306) 5. Administrative Safeguards You ll need to implement policies and procedures to manage the selection, development, implementation, and maintenance of security measures to protect electronic protected health information and to manage the conduct of your workforce in relation to the protection of that information. (45 C.F.R. 164.306) 11

6. Business Associate Agreement For any Business Associate you work with that will need to access or maintain your ephi and an online backup service qualifies you will need that entity to sign a Business Associate Agreement (BAA), which places the BA under shared responsibility with you for all ephi they handle, in accordance with HIPAA guidelines. (45 C.F.R. 160.103) Note: You should immediately dismiss from consideration any would-be online backup provider that refuses to sign a binding BAA with you. HIPAA Requirement Clause KeepItSafe Backup All Covered entities and business associates must securely back up retrievable exact copies of electronic protected health information (CFR 164.308(7)(ii) (A)). We back up exact copies of your all of your data emails, SQL files, meta data, etc. Recovery You must be able to fully restore any loss of data (CFR 164.308(7)(ii) (B)). Our suite of backup and DR solutions allows for the total restore of any lost data and we have the success stories to prove it. Offsite Data Backup You must store your data offsite (CFR 164.308(a)(1)) - HIPAA Security Final Rule We provide cloud and hybridbased backup, protecting your ephi multiple, geographically redundant, tier-4 data centers. Encryption/ Data Destruction ephi must be encrypted or destroyed at rest to secure it. Section 13402(h) of Title XIII HITECH Act We provide military-grade, 256-bit encryption (FIPS -140-2) and ensure only you have an encryption key, to comply with the Privacy Law. Testing Implement procedures for periodic testing and revision of contingency plans. (CFR 164.308(7)(ii) (D)). KeepItSafe DR includes regular testing to ensure ongoing ephi security and your compliance with HIPAA. 12

HIPAA Requirement Clause KeepItSafe Technical Safeguards Technology and the policy and procedures for its use that protect electronic protected health information and control access to it. 45 C.F.R. 164.306 (Security Rule) ISO-27001 Suite of Data Recovery Solutions Fully Managed and Monitored Encryption. Physical Safeguards Physical measures, policies, and procedures to protect a covered entity s or business associate s electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion. 45 C.F.R. 164.306 (Security Rule) KeepItSafe protects your ephi at all times in state -of-theart secure data centers protected by firewalls, onsite guards 24/7 and biometric and other physical restrictions. Administrative Safeguards Administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect ephi and to manage the conduct of the covered entity s or business associate s workforce in relation to the protection of that information. 45 C.F.R. 164.306 (Security Rule) We deploy protective data safeguards designed specifically for ephi and we offer third-party employee training to ensure a security and compliance culture. The Privacy Rule 40 pages, but includes patient confidentiality and business associates agreements 45 C.F.R. 160.103 KeepItSafe will enter into a BAA for contractual assurance that your ephi security complies with HIPAA. Disaster Recovery Planning The Covered Entity or Business Associate must maintain readiness for lost ephi. Federal Register Vol 68, no 34, sections 164.308 & 164.310 We also offer Business Continuity Planning in accordance with HIPAA s guidelines. 13

CONCLUSION: NOW IS THE TIME FOR A BACKUP SOLUTION THAT MEETS HIPAA STANDARDS With the increasing enforcement of HIPAA regulators, the ease with which a Covered Entity can accidentally violate one of the law s many online-backup requirements, and the steep costs for making a mistake, your business should deploy an offsite backup solution to protect your ephi as soon as possible. Start by learning more about KeepItSafe s online backup and DR solutions and how they can keep your business on the right side of HIPAA. 18037 2018 KeepItSafe, Inc. All rights reserved. KeepItSafe is a trademark of KeepItSafe, Inc. or its affiliates and is registered 14 in the United States and other countries. All other trademarks cited herein are the property of their respective owners.