Sector solutions


eAsset Solutions’ data security and destruction procedures comply with the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and Health Information Technology for Economic and Clinical Health (HITECH.)

HIPAA: The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law that required the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge. The US Department of Health and Human Services (HHS) issued the HIPAA Privacy Rule to implement the requirements of HIPAA. The HIPAA Security Rule protects a subset of information covered by the Privacy Rule.

HIPAA Privacy Rule
The Privacy Rule standards address the use and disclosure of individuals’ health information (known as protected health information or PHI) by entities subject to the Privacy Rule. These individuals and organizations are called “covered entities.”
HIPAA’s Security Rule

Keeping track of your IT assets is important for maintaining strong security posture. eAsset Solutions offers data destruction documentation and asset inventory services with a secure chain-of-custody.

The HIPAA Security Rule establishes national standards to protect individuals' electronic personal health information that is created, received, used, or maintained by a covered entity. The Security Rule requires appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information.

Ensure that your health organization is compliant with HIPAA’s administrative, physical, and technical safeguards. The HIPAA Security Rule and other standards help ensure safeguarding electronic protected health information (e-PHI).