
{"id":1697,"date":"2015-12-07T00:00:00","date_gmt":"2015-12-07T00:00:00","guid":{"rendered":"http:\/\/otava.test\/encrypting-data-to-meet-hipaa-compliance\/"},"modified":"2015-12-07T00:00:00","modified_gmt":"2015-12-07T00:00:00","slug":"encrypting-data-to-meet-hipaa-compliance","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/","title":{"rendered":"Encrypting Data to Meet HIPAA Compliance"},"content":{"rendered":"<p>To address the question of whether or not to use data encryption when it comes to meeting <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA compliance<\/a> and keeping patient health information (PHI) protected, let\u2019s revisit the Health Insurance Portability and Accountability Act of 1996 (HIPAA):<\/p>\n<blockquote><p>A covered entity must, in accordance with \u00a7164.306\u2026 Implement a mechanism to encrypt and decrypt electronic protected health information.&#8221;\u00a0(45 CFR \u00a7 164.312(a)(2)(iv))<\/p><\/blockquote>\n<p>If you choose not to encrypt data, the HIPAA Security Rule states you must implement an equivalent solution to meet the regulatory requirement. The law leaves encryption open to interpretation since covered entities vary when it comes to network and network usage, depending on the type and size of business.<img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-17516\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/data-encryption-for-hipaa-compliance.jpg\" alt=\"Encrypting data to meet HIPAA compliance\" width=\"350\" height=\"245\" \/><\/p>\n<p>While HIPAA and HITECH address the security and privacy of PHI with more of a policy and procedures-oriented approach with no strict parameters for what type of technology to use, encryption is typically considered a best practice when it comes to protecting sensitive data.<\/p>\n<p>A few recommendations when it comes to data encryption:<\/p>\n<ul>\n<li>Don\u2019t use public FTP (File Transfer Protocol) if you need to transfer patient data to and from payers or other business associates.<\/li>\n<li>To err on the safe side would be to combine two methods of encryption &#8211; send encrypted files over an encrypted connection.<\/li>\n<li>When it comes to remote access to applications and data in cases of telecommuting or working from remote locations, use a VPN (Virtual Private Network). This network creates a temporary encrypted connection that only exists during the time of use.<\/li>\n<li>Always use <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">SSL (Secure Sockets Layer)<\/a> for web-based access to any sensitive data.<\/li>\n<li>Keeping sensitive data on a portable device is not recommended &#8211; it is better to store your data in an offsite location with a secure environment, such as a <a href=\"https:\/\/otavawebsite.wpengine.com\/operations\/locations\/michigan-cloud-and-data-centers\/\/compliance\/hipaa-compliant-data-centers\">HIPAA compliant data center<\/a> with the proper physical and network security in place to protect PHI and prevent a data breach. This is a lesson learned as shown by the case of the <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/sutter-health-hipaa-breach-lessons-learned\/\">Sutter Health HIPAA breach<\/a> due to a stolen unencrypted desktop PC. An audited <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA hosting<\/a> solution can also offer greater protection with additional security measures such as a virtual or dedicated firewall, backup, antivirus and OS patch management.<\/li>\n<li>However, if a portable device needs to be encrypted due to stored sensitive information, file\/folder level encryption and full disk encryption (FDE) are both options to keep data safe while stored locally.<\/li>\n<li>When it comes to mobile devices that store data including CD\u2019s, DVD\u2019s, USBs, iPods and Blackberry\u2019s, encryption of the data on the device can help protect against a HIPAA breach. Other options include putting in place a policy for mobile device use and PHI storage, limiting certain data from being stored on the devices, or implementing access controls to the device, including password protection.<\/li>\n<li>Data at rest needs to be encrypted as well &#8211; this includes data stored on disk drives, backup tapes, or servers since they can be accessed from remote locations and in the physical location if not properly locked\/secured.<\/li>\n<li>Following the NIST (National Institute of Standards and Technology) standard, called the Advanced Encryption Standard (AES) for encryption is considered another best practice.<\/li>\n<li>Other methods that can help you determine if you need encryption include completing a HIPAA risk assessment, performing a gap analysis to find out what you\u2019re missing in your current security environment, and developing and documenting solutions to become more resilient to the risk of a data breach.<\/li>\n<\/ul>\n<p>Find out more about the <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/hipaa-compliant-hosting\/resources\/benefits-of-hipaa-compliant-hosting\">Benefits of HIPAA Compliant Hosting<\/a> and basic definitions in our <a href=\"https:\/\/otavawebsite.wpengine.com\/reference\/hipaa-glossary-of-terms\/\">HIPAA Glossary of Terms<\/a>. Get examples of HIPAA training, privacy policies, procedures and forms from established HIPAA compliant medical centers and universities in our <a href=\"https:\/\/otavawebsite.wpengine.com\/reference\/hipaa-resources-policies-procedures-and-training-materials\/\">HIPAA Resources<\/a> section.<\/p>\n<p><a href=\"https:\/\/web.otava.com\/white-papers\/hipaa-compliant-hosting-white-paper\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/hipaa-white-paper.gif\" alt=\"HIPAA Compliant Data Centers\" width=\"150\" height=\"110\" \/><\/a><\/p>\n<p><em>Looking for more information on HIPAA IT requirements, recommendations, and the foundation of a secure <a href=\"https:\/\/otavawebsite.wpengine.com\/operations\/locations\/michigan-cloud-and-data-centers\/\/compliance\/hipaa-compliant-data-centers\">HIPAA compliant data center<\/a>?<\/em><\/p>\n<p><strong><a href=\"https:\/\/web.otava.com\/white-papers\/hipaa-compliant-hosting-white-paper\">Download our HIPAA Compliant Data Centers white paper<\/a><\/strong>\u00a0now for a complete guide to HIPAA hosting with IT vendors.<\/p>\n<p><strong>Still have questions?\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/contact\/\">Contact us<\/a><\/strong>\u00a0now! Find out more about our fully compliant,\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA hosting solutions<\/a>\u00a0(including the <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA Encrypted Cloud<\/a>), or\u00a0<strong><a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">submit a quote request<\/a><\/strong>\u00a0for your project today.<\/p>\n<p>Read more on HIPAA and encryption in:<br \/>\n<em><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/\">HIPAA Encryption in the Cloud: Don\u2019t Sacrifice Performance for Security<\/a><\/strong><\/em><br \/>\nEarlier this year, OCR (Office for Civil Rights) Director Leon Rodriguez was quoted on the topic of HIPAA encryption: \u201c\u2026regardless of size, covered entities must take action and will be held accountable for safeguarding their patients\u2019 health information. Encryption is an \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/\">Continue reading \u2192<\/a><\/p>\n<p><em><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/get-ready-for-hipaa-audits-with-encryption-a-risk-analysis\/\">Get Ready for HIPAA Audits with Encryption &amp; A Risk Analysis<\/a><\/strong><\/em><br \/>\nRemember the pilot HIPAA audit program conducted by the OCR (Office for Civil Rights) last year? HealthCareInfoSecurity.com reports on the findings, as revealed in an interview with an OCR attorney. About 44 percent had issues with their uses and disclosures \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/get-ready-for-hipaa-audits-with-encryption-a-risk-analysis\/\">Continue reading \u2192<\/a><\/p>\n<p><em><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/high-capacity-encrypted-hipaa-clouds-for-medical-imaging-data-security\/\">High-Capacity, Encrypted HIPAA Clouds for Medical Imaging Data Security<\/a><\/strong><\/em><br \/>\nA recent healthcare data breach was reported by HealthDataManagement.com as a result of a stolen unencrypted laptop, a component of a diagnostic imaging machine. Retinal Consultant Medical Group notified patients that their names, DOBs, gender, race and optical coherence tomography \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/high-capacity-encrypted-hipaa-clouds-for-medical-imaging-data-security\/\">Continue reading \u2192<\/a><\/p>\n<p>Or check out all <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/encryption-2\/\">Encryption articles here<\/a>.<\/p>\n<p>Sources:<br \/>\n<a href=\"https:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf\">Advanced Encryption Standard (AES)<\/a><br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/wp-content\/uploads\/WP-Encryption-Whitepaper-7.7.10.doc\">Encryption White Paper<\/a>\u00a0(.doc)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>To address the question of whether or not to use data encryption when it comes to meeting HIPAA compliance and keeping patient health information (PHI) protected, let\u2019s revisit the Health Insurance Portability and Accountability Act of 1996 (HIPAA): A covered entity must, in accordance with \u00a7164.306\u2026 Implement a mechanism to encrypt and decrypt electronic protected health information.&#8221;\u00a0(45 CFR \u00a7 164.312(a)(2)(iv)) If you choose not to encrypt data, the HIPAA Security Rule states you must implement an equivalent solution to meet the regulatory requirement. The law leaves encryption open to interpretation since covered entities vary when it comes to network and network usage, depending on the type and size of business. While HIPAA and HITECH address the security and privacy of PHI with more of a policy and procedures-oriented approach with no strict parameters for what type of technology to use, encryption is typically considered a best practice when it comes to protecting sensitive data. A few recommendations when it comes to data encryption: Don\u2019t use public FTP (File Transfer Protocol) if you need to transfer patient data to and from payers or other business associates. To err on the safe side would be to combine two methods of encryption &#8211;&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[45,47],"tags":[83,212,100,213],"other_category":[],"class_list":["post-1697","post","type-post","status-publish","format-standard","hentry","category-cloud-computing","category-compliance","tag-cybersecurity","tag-encryption","tag-hipaa-compliance","tag-hipaa-compliant-hosting"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Encrypting Sensitive Data to Meet HIPAA Compliance | OTAVA<\/title>\n<meta name=\"description\" content=\"Encryption is typically considered a best practice when it comes to protecting sensitive data. Here&#039;s our recommendation\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encrypting Data to Meet HIPAA Compliance\" \/>\n<meta property=\"og:description\" content=\"Encryption is typically considered a best practice when it comes to protecting sensitive data. Here&#039;s our recommendation\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-07T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/data-encryption-for-hipaa-compliance.jpg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Encrypting Data to Meet HIPAA Compliance\",\"datePublished\":\"2015-12-07T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/\"},\"wordCount\":869,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/data-encryption-for-hipaa-compliance.jpg\",\"keywords\":[\"cybersecurity\",\"encryption\",\"HIPAA compliance\",\"HIPAA compliant hosting\"],\"articleSection\":[\"Cloud Computing\",\"Compliance\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/\",\"url\":\"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/\",\"name\":\"Encrypting Sensitive Data to Meet HIPAA Compliance | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/data-encryption-for-hipaa-compliance.jpg\",\"datePublished\":\"2015-12-07T00:00:00+00:00\",\"description\":\"Encryption is typically considered a best practice when it comes to protecting sensitive data. Here's our recommendation\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/data-encryption-for-hipaa-compliance.jpg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/data-encryption-for-hipaa-compliance.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encrypting Data to Meet HIPAA Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Encrypting Sensitive Data to Meet HIPAA Compliance | OTAVA","description":"Encryption is typically considered a best practice when it comes to protecting sensitive data. Here's our recommendation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Encrypting Data to Meet HIPAA Compliance","og_description":"Encryption is typically considered a best practice when it comes to protecting sensitive data. Here's our recommendation","og_url":"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/","og_site_name":"OTAVA","article_published_time":"2015-12-07T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/data-encryption-for-hipaa-compliance.jpg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Encrypting Data to Meet HIPAA Compliance","datePublished":"2015-12-07T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/"},"wordCount":869,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/data-encryption-for-hipaa-compliance.jpg","keywords":["cybersecurity","encryption","HIPAA compliance","HIPAA compliant hosting"],"articleSection":["Cloud Computing","Compliance"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/","url":"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/","name":"Encrypting Sensitive Data to Meet HIPAA Compliance | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/data-encryption-for-hipaa-compliance.jpg","datePublished":"2015-12-07T00:00:00+00:00","description":"Encryption is typically considered a best practice when it comes to protecting sensitive data. Here's our recommendation","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/data-encryption-for-hipaa-compliance.jpg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/data-encryption-for-hipaa-compliance.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Encrypting Data to Meet HIPAA Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/1697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=1697"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/1697\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=1697"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=1697"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=1697"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=1697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}