Welcome
Login  Sign up

Reference

Accessing Archived Logs
App container and SSH access logs are permanently stored in S3. Logs are streamed in near real-time to the archive, to minimize loss of data in the unlikely...
Thu, 3 Aug, 2017 at 10:20 AM
Application Developer Guidelines
When PHI is viewed or modified, your application should record the identity of the person and the timestamp (other metadata, e.g. IP address, is not requir...
Thu, 14 Jul, 2022 at 2:34 PM
Customer Responsibilities
Customers have the following responsibilities with regard to using the Healthcare Blocks platform: 1. Using up-to-date versions of programming languages, a...
Thu, 14 Jul, 2022 at 3:45 PM
Data Volume Wiping
When an AWS Elastic Block Storage (EBS) volume is deleted, AWS automatically wipes its contents using an unspecified method.  Upon request, Healthcare Bloc...
Tue, 13 Mar, 2018 at 1:48 PM
Enhanced Security Architecture
Production systems may encounter unexpected software bugs, performance and scaling issues. Application owners typically need access to application and datab...
Wed, 25 May, 2022 at 3:31 PM
Logging
For all servers, SSH access logs are permanently archived in our intrusion detection system (IDS) database, which is replicated and backed up nightly. A ...
Fri, 2 Sep, 2016 at 2:40 PM
Malware Detection
The Healthcare Blocks platform performs a daily malware scan of every virtual machine using the following tools: ClamAV Rootkit Hunter Malware signatur...
Tue, 20 Sep, 2022 at 8:50 AM
Penetration and Vulnerability Testing
Guidance While HIPAA does not have a specific requirement with regard to penetration and vulnerability testing, it is a requirement that comes up regularly...
Tue, 23 Mar, 2021 at 10:22 AM
Policies and Procedures
HIPAA imposes many responsibilities upon an organization that is transmitting and/or storing protected health information (PHI). One of the comprehensive re...
Thu, 14 Jul, 2022 at 2:36 PM
Protected Health Information
Under the US Health Insurance Portability and Accountability Act (HIPAA), PHI that is linked based on the following list of 18 identifiers must be treated w...
Mon, 22 Aug, 2016 at 9:10 AM