Group: Forum Members
Posts: 2K,
Visits: 6.6K
|
I'm not a HIPAA expert, but from what I know, the RBS security will go a long ways in helping you get there. As I understand it, from a HIPAA stand point, what you really need to do is provide means to control access to private information of patients/clients etc. Only personnel that need access to this information should have access and those persons need to be accountable for how they use it. The data is typically stored in a database(s) of some type and accessed by an application(s). Thus you need to control access to the database(s) and to the application(s).
This fall under the HIPAA Security Rule (as I understand it), which relates to securing personal health information that is stored electronically. The language of the rules states that you have to use "reasonable and appropriate" measures to ensure the security of the data. Thus, if a trusted person is admin of the db and there are locks on the doors, with policies in place to control who has access, this might be enough to ensure that the data is secure. If the admin is a contractor or the servers aren't as secure, you might need to go the encryption route to ensure that no one who isn't authorized to view the data can get to it directly on the database.
Controlling access to the application can be handled beautifully by the SF's Role Based Security (RBS). There are two things you need to do:
1. Authenticate the user, so you know who is accessing the application.
2. Control access to data within the application via permissions assigned to known users
Using Windows authentication provides a means to handle the first item. Using the user's Windows login can ensure that you know who the user is via the domain login they use. Assuming the organization has good policies in place related to user accounts, this is great. The user only needs one user name/password, life is good. The RBS also provides everything needed for authentication, including forced password changes, strong password enforcement, password expiration, scheduled expiration (for contractors or if you know some is leaving) and disabling of users. This might needed if the organization doesn't use a domain or if they aren't strict enough related to users logging into their computers.
No matter how the user is authenticated however, the application needs some way to map that user to a set of permissions that will control access to the data. This means that even if you use Windows authentication, you will need to setup the user in your application, so you can assign permissions to them. This is handled very nicely by the RBS. Permissions are created that the application uses (SecurityKey property for forms and BOs). You can setup security from form level to field level. See the SF documentation for more info.
Another thing that is provided in RBS is auditing, which isn't quite complete yet, but the code to do the auditing is there and I believe you can control it via code as needed. This allows you to audit access to data (who/when/how). Do search here in the forum on auditing to get started there.
Of course, these software tools are designed to help the organization implement the policies that actually implement the HIPAA rules, so you need to understand the dental office's policies to fully understand how to support them in your application.
I'm sure the SF guys will have more information too! Hope that helps!
|