iTnews

University of Texas Health Science Center completes data security project

By Robert Jaques on Oct 1, 2004 10:24AM

The University of Texas (UT) Health Science Center at Houston completed a network upgrade to protect and encrypt personally identifiable patient and employee financial information, electronic protected health information (EPHI) and intellectual property.

In order to ensure compliance with the Title II requirements of the Health Insurance Portability and Accountability Act of 1996 (HIPAA), UT Health Science Center selected Vormetric's CoreGuard Information Protection System to secure sensitive and confidential personal information used in its treatment and research.

HIPAA specifically addresses the security and privacy of health data, requiring health care providers and services to maintain reasonable and appropriate administrative, physical and technical safeguards to ensure the security or integrity of electronic health information.

According to Gartner research analyst Thomas Handler, "Security and confidentiality must be guaranteed, while balancing the need for legitimate access to records. In light of HIPAA regulations and rising consumer concern over privacy and confidentiality, a computer-based patient record system must have very robust security measures and technology."

"We have always taken the protection of our sensitive information seriously, but we wanted to completely ensure the integrity of our data by implementing another layer of security on our locally-attached storage," said Kevin Granhold, director of server and desktop services.

Granhold said that the policy-based Vormetric CoreGuard Information Protection System helped to secure the organisation's electronic assets without affecting the rest of its network environment or the performance of its IT infrastructure: "It also lets us easily extend information protection throughout our environment as new requirements arise."

Using the system's context-aware access control, UT is able to define the allowed user/application access combinations, the types of permissible access, and the locations from where data can be accessed, as well as whether the data is in encrypted or cleartext form.

Vormetric's MetaClear encryption feature is used to encrypt file content without encrypting the file system metadata, so allowing UT's administrators to manage data without first having to decrypt it, which would expose data in the clear at the backup server.

www.uth.tmc.edu
www.vormetric.com

 

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
centercompletesdatahealthofprojectsciencesecuritytexasuniversity

Partner Content

Top 5 Benefits of Managed IT Services
Promoted Content Top 5 Benefits of Managed IT Services
5 essential digital transformation ideas
Promoted Content 5 essential digital transformation ideas
Alienated from your own data? You’re not alone
Promoted Content Alienated from your own data? You’re not alone
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • 11th Annual Fraud Prevention Summit 2022
  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Robert Jaques
Oct 1 2004
10:24AM
0 Comments

Related Articles

  • Public sector data sharing laws pass parliament with Labor changes
  • Nvidia says employee, company information leaked online after cyber attack
  • NSW Education had unknown vulnerability in breached system
  • Home Affairs boss says big tech is bigger surveillance threat than government
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co sizes up six-figure customer exodus a year to fixed wireless

NBN Co sizes up six-figure customer exodus a year to fixed wireless

NBN Co to cut 160 applications under $200m IT simplification

NBN Co to cut 160 applications under $200m IT simplification

Kmart Australia re-platforms ecommerce site to AWS

Kmart Australia re-platforms ecommerce site to AWS

Digital Nation

CTO Juergen Mueller offers a glimpse into SAP's metaverse play
CTO Juergen Mueller offers a glimpse into SAP's metaverse play
COVER STORY: Data and IoT set digital agriculture on a sustainable future
COVER STORY: Data and IoT set digital agriculture on a sustainable future
Why do DeFi and DAOs matter to business?
Why do DeFi and DAOs matter to business?
Lendlease launches its own metaverse in Milan
Lendlease launches its own metaverse in Milan
COVER STORY: A Year in the Metaverse
COVER STORY: A Year in the Metaverse
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.