
{"id":2582,"date":"2013-08-20T00:00:00","date_gmt":"2013-08-20T00:00:00","guid":{"rendered":"http:\/\/otava.test\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/"},"modified":"2013-08-20T00:00:00","modified_gmt":"2013-08-20T00:00:00","slug":"hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/","title":{"rendered":"HIPAA Encryption in the Cloud: Don&#8217;t Sacrifice Performance for Security"},"content":{"rendered":"<figure style=\"width: 86px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" title=\"OCR Director Leon Rodriguez\" src=\"https:\/\/www.hhs.gov\/ocr\/office\/OCR%20images\/leonrodriguez.jpg\" alt=\"OCR Director Leon Rodriguez\" width=\"86\" height=\"121\" \/><figcaption class=\"wp-caption-text\">OCR Director Leon Rodriguez<\/figcaption><\/figure>\n<p dir=\"ltr\">Earlier this year, OCR (Office for Civil Rights) Director Leon Rodriguez was quoted on the topic of\u00a0<a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/encryption\">HIPAA encryption<\/a>: <em>\u201c&#8230;regardless of size, covered entities must take action and will be held accountable for safeguarding their patients\u2019 health information. <strong>Encryption is an easy method for making lost information unusable, unreadable and undecipherable.\u201d<\/strong><\/em><\/p>\n<p dir=\"ltr\">This was in response to the first HIPAA breach settlement involving a case affecting less than 500 patients in which an unencrypted laptop was stolen. The hospice company never conducted a HIPAA risk analysis and didn\u2019t have mobile device security policies or procedures in place. As the first step toward implementing HIPAA safeguards, all healthcare organizations should conduct a risk analysis with these nine components:<\/p>\n<ol>\n<li>Scope of the Analysis<\/li>\n<li>Data Collection<\/li>\n<li>Identify and Document Potential Threats and Vulnerabilities<\/li>\n<li>Assess Current Security Measures<\/li>\n<li>Determine the Likelihood of Threat Occurrence<\/li>\n<li>Determine the Potential Impact of Threat Occurrence<\/li>\n<li>Determine the Level of Risk<\/li>\n<li>Finalize Documentation<\/li>\n<li>Periodic Review and Updates to the Risk Assessment<\/li>\n<\/ol>\n<p dir=\"ltr\">This list entails a high-level overview of the necessary components, but for complete details read our guide <em><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/reference\/whats-in-a-hipaa-risk-analysis\/\">What\u2019s in a HIPAA Risk Analysis?<\/a><\/strong><\/em> To find out what type of mobile device security policies and procedures to enforce in your workplace, read our <strong><a href=\"https:\/\/otavawebsite.wpengine.com\/about\/resources\/\">Mobile Security White Paper<\/a>.<\/strong><\/p>\n<p><strong>HIPAA Encryption of Data at Rest and In Transit<\/strong><br \/>\nWhile encrypting devices can prevent unauthorized access to electronic protected health data (ePHI), encrypting data at rest and in transit at the disk level can also prevent a data breach by keeping data in secure, <a href=\"https:\/\/otavawebsite.wpengine.com\/operations\/locations\/michigan-cloud-and-data-centers\/\/compliance\/hipaa-compliant-data-centers\">HIPAA compliant data centers<\/a> and restricting access to a limited number of people. A data center operator can test their facilities and server hosting services by contracting with an independent third-party auditor that uses the <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/hipaa-compliant-hosting\/resources\/hipaa-glossary-of-terms#OCRprotocol\">OCR HIPAA Audit Protocol<\/a> to test their security practices against.<\/p>\n<p dir=\"ltr\">Particularly in the cloud, encryption is an important aspect of keeping data safe and in compliance with the HIPAA Security Rule. A <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA compliant cloud<\/a> should provide encryption of data at rest, including data that is stored as backups and archived as part of an <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/data-protection\/disaster-recovery-as-a-service\">IT disaster recovery plan<\/a>. The cloud should also provide encryption of data in transit for complete security.<\/p>\n<p><strong>Ensuring Performance and Security with HIPAA Encryption in the Cloud<\/strong><br \/>\nHowever, the tradeoff with encryption in the HIPAA cloud is often at the expense of computing performance, as it takes significant processing power, according to SearchCompliance.TechTarget.com. Partnering with a cloud service provider that can provide enterprise-class infrastructure and the ability to encrypt without affecting performance is key for supporting health IT.<\/p>\n<figure id=\"attachment_12704\" aria-describedby=\"caption-attachment-12704\" style=\"width: 230px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-12704 \" title=\"EMC VMAX: Enabling Encrypted Clouds\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/EMC-VMAX.png\" alt=\"EMC VMAX: Enabling Encrypted Clouds\" width=\"230\" height=\"201\" \/><figcaption id=\"caption-attachment-12704\" class=\"wp-caption-text\">EMC VMAX: Enabling Encrypted Clouds<\/figcaption><\/figure>\n<p dir=\"ltr\">Not all clouds are built the same. One example of cloud enterprise-class infrastructure is the EMC VMAX 10K SAN (storage area network) that supports data at rest encryption implemented within their platform. With an encrypted storage platform, data is encrypted when written to drives and decrypted when read from drives with no impact on performance, or local or remote replication, according to EMC.com. A SAN is a high-speed network that is part of a system\u2019s overall computing resource network; it connects storage devices (such as disks) to servers to facilitate data transfer.<\/p>\n<p><strong>HIPAA Encryption Standards<\/strong><br \/>\nThe type of encryption used by EMC VMAX is AES-256-bit (Advanced Encryption Standard). The National Institute of Standards and Technology (NIST) approves the AES algorithm used to protect electronic data to the level of the Federal Information Processing Standards Publications (FIPS PUBS). Within the HIPAA Breach Notification Rule, the Dept. of Health and Human Services recommends adherence to the NIST Special Publication 800-111, <a href=\"https:\/\/csrc.nist.gov\/publications\/nistpubs\/800-111\/SP800-111.pdf\">Guide to Storage Encryption Technologies for End User Devices<\/a> (PDF). And within that document, NIST recommends using the AES algorithm due to its strength and speed.<\/p>\n<p dir=\"ltr\">Securing data on enterprise storage with encryption reduces the chances of potential exposure of sensitive data on stolen media (including portable devices such as laptops). In the case of the hospice\u2019s stolen unencrypted laptop, the use of an <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">encrypted HIPAA cloud<\/a> infrastructure may have prevented the data breach and settlements as a result.<\/p>\n<p><strong>Upcoming HIPAA Encryption Webinar<\/strong><br \/>\n<a href=\"https:\/\/www.onlinetech.com\/resources\/white-papers\/hipaa-compliant-data-centers\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"HIPAA Compliant Hosting White Paper\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-hipaa.png\" alt=\"HIPAA Compliant Hosting White Paper\" width=\"252\" height=\"114\" \/><\/a>Want to learn more the HHS&#8217;s encryption standards for securing PHI? Join our upcoming webinar, <em><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/\">Removing the &#8216;Cryptic&#8217; from &#8216;Encryption&#8217; &#8211; HIPAA and the Meaning of Secure PHI<\/a><\/strong><\/em>, hosted by Online Tech&#8217;s April Sage and Brian Balow of Dickinson Wright, an attorney focused on IT, healthcare law and intellectual property. Held <strong>Tuesday, September 17 @2PM ET<\/strong>, it&#8217;s free to join and we encourage submitting your questions about HIPAA encryption in advance. <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/\">Sign up online here<\/a>.<\/p>\n<p>Related Articles:<br \/>\n<em><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/high-capacity-encrypted-hipaa-clouds-for-medical-imaging-data-security\/\">High-Capacity, Encrypted HIPAA Clouds for Medical Imaging Data Security<\/a><\/strong><\/em><br \/>\nA recent healthcare data breach was reported by HealthDataManagement.com as a result of a stolen unencrypted laptop, a component of a diagnostic imaging machine. Retinal Consultant Medical Group notified patients that their names, DOBs, gender, race and optical coherence tomography \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/high-capacity-encrypted-hipaa-clouds-for-medical-imaging-data-security\/\">Continue reading \u2192<\/a><\/p>\n<p><em><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/hipaa-encryption-first-steps-to-identifying-and-securing-health-data\/\">HIPAA Encryption: First Steps to Identifying and Securing Health Data<\/a><\/strong><\/em><br \/>\nAccording to DetroitNews.com, personal information of 49,000 individuals \u2013 including that of names, SSNs, DOB, cancer screening test results and dates of completion \u2013 were accessed by hackers recently. The data resided in a password-protected area of the Michigan Cancer \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/hipaa-encryption-first-steps-to-identifying-and-securing-health-data\/\">Continue reading \u2192<\/a><\/p>\n<p><em><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/encrypting-backup-data-for-hipaa-and-pci-compliance\/\">Encrypting Backup Data for HIPAA and PCI Compliance<\/a><\/strong><\/em><br \/>\nStored data is a top target by hackers, especially the type of data that can be used for fraud and medical identity theft \u2013 within the healthcare industry in particular, encrypting stored data to meet HIPAA compliance is one way \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/encrypting-backup-data-for-hipaa-and-pci-compliance\/\">Continue reading \u2192<\/a><\/p>\n<p>References:<br \/>\n<a href=\"https:\/\/www.hhs.gov\/news\/press\/2013pres\/01\/20130102a.html\">HHS Announces First HIPAA Breach Settlement Involving Less Than 500 Patients<\/a><br \/>\n<a href=\"https:\/\/www.emc.com\/collateral\/hardware\/white-papers\/h8073-symmetrix-data-at-rest-encryption-wp.pdf\">EMC Symmetrix Data at Rest Encryption<\/a> (PDF)<br \/>\n<a href=\"https:\/\/www.emc.com\/collateral\/hardware\/specification-sheet\/h8716-symmetrix-vmax-10k-ss.pdf\">EMC Symmetrix VMAX 10K<\/a> (PDF)<br \/>\n<a href=\"https:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf\">Federal Information Processing Standards Publication 197: AES<\/a> (PDF)<br \/>\n<a href=\"https:\/\/www.hhs.gov\/ocr\/privacy\/hipaa\/administrative\/breachnotificationrule\/brguidance.html\">Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals<\/a><\/p>\n<div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Earlier this year, OCR (Office for Civil Rights) Director Leon Rodriguez was quoted on the topic of\u00a0HIPAA encryption: \u201c&#8230;regardless of size, covered entities must take action and will be held accountable for safeguarding their patients\u2019 health information. Encryption is an easy method for making lost information unusable, unreadable and undecipherable.\u201d This was in response to the first HIPAA breach settlement involving a case affecting less than 500 patients in which an unencrypted laptop was stolen. The hospice company never conducted a HIPAA risk analysis and didn\u2019t have mobile device security policies or procedures in place. As the first step toward implementing HIPAA safeguards, all healthcare organizations should conduct a risk analysis with these nine components: Scope of the Analysis Data Collection Identify and Document Potential Threats and Vulnerabilities Assess Current Security Measures Determine the Likelihood of Threat Occurrence Determine the Potential Impact of Threat Occurrence Determine the Level of Risk Finalize Documentation Periodic Review and Updates to the Risk Assessment This list entails a high-level overview of the necessary components, but for complete details read our guide What\u2019s in a HIPAA Risk Analysis? To find out what type of mobile device security policies and procedures to enforce in your workplace,&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2582","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>HIPAA Encryption in the Cloud: Don&#039;t Sacrifice Performance for Security | OTAVA<\/title>\n<meta name=\"description\" content=\"As the first step toward implementing HIPAA safeguards, all healthcare organizations should conduct a risk analysis with these nine components:\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HIPAA Encryption in the Cloud: Don&#039;t Sacrifice Performance for Security\" \/>\n<meta property=\"og:description\" content=\"As the first step toward implementing HIPAA safeguards, all healthcare organizations should conduct a risk analysis with these nine components:\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-08-20T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hhs.gov\/ocr\/office\/OCR%20images\/leonrodriguez.jpg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"HIPAA Encryption in the Cloud: Don&#8217;t Sacrifice Performance for Security\",\"datePublished\":\"2013-08-20T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/\"},\"wordCount\":974,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hhs.gov\/ocr\/office\/OCR%20images\/leonrodriguez.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/\",\"url\":\"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/\",\"name\":\"HIPAA Encryption in the Cloud: Don't Sacrifice Performance for Security | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hhs.gov\/ocr\/office\/OCR%20images\/leonrodriguez.jpg\",\"datePublished\":\"2013-08-20T00:00:00+00:00\",\"description\":\"As the first step toward implementing HIPAA safeguards, all healthcare organizations should conduct a risk analysis with these nine components:\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/#primaryimage\",\"url\":\"https:\/\/www.hhs.gov\/ocr\/office\/OCR%20images\/leonrodriguez.jpg\",\"contentUrl\":\"https:\/\/www.hhs.gov\/ocr\/office\/OCR%20images\/leonrodriguez.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HIPAA Encryption in the Cloud: Don&#8217;t Sacrifice Performance for Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"HIPAA Encryption in the Cloud: Don't Sacrifice Performance for Security | OTAVA","description":"As the first step toward implementing HIPAA safeguards, all healthcare organizations should conduct a risk analysis with these nine components:","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/","og_locale":"en_US","og_type":"article","og_title":"HIPAA Encryption in the Cloud: Don't Sacrifice Performance for Security","og_description":"As the first step toward implementing HIPAA safeguards, all healthcare organizations should conduct a risk analysis with these nine components:","og_url":"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/","og_site_name":"OTAVA","article_published_time":"2013-08-20T00:00:00+00:00","og_image":[{"url":"https:\/\/www.hhs.gov\/ocr\/office\/OCR%20images\/leonrodriguez.jpg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"HIPAA Encryption in the Cloud: Don&#8217;t Sacrifice Performance for Security","datePublished":"2013-08-20T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/"},"wordCount":974,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hhs.gov\/ocr\/office\/OCR%20images\/leonrodriguez.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/","url":"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/","name":"HIPAA Encryption in the Cloud: Don't Sacrifice Performance for Security | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hhs.gov\/ocr\/office\/OCR%20images\/leonrodriguez.jpg","datePublished":"2013-08-20T00:00:00+00:00","description":"As the first step toward implementing HIPAA safeguards, all healthcare organizations should conduct a risk analysis with these nine components:","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/#primaryimage","url":"https:\/\/www.hhs.gov\/ocr\/office\/OCR%20images\/leonrodriguez.jpg","contentUrl":"https:\/\/www.hhs.gov\/ocr\/office\/OCR%20images\/leonrodriguez.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"HIPAA Encryption in the Cloud: Don&#8217;t Sacrifice Performance for Security"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2582","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2582"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2582\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2582"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2582"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2582"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}