1. Privacy Rule: How, when, and under what circumstances ePHI can be used and disclosed
2. Security Rule: Technical, physical, and administrative standards to safeguard the integrity of ePHI
3. Omnibus Rule: Integration of HITECH’s provisions into HIPAA to strengthen protection of ePHI
4. Breach Notification Rule: Terms and conditions for the notification of data breaches involving ePHI to interested parties and the public
5. Enforcement Rule: Investigation and penalties applied following a data breach involving ePHI
Over the years, the requirements have been integrated and expanded in response to technological advancements in healthcare and other industries.
What is a no-view service? The term “no-view service” describes the situation in which the Cloud Service Provider (CSP) maintains encrypted ePHI on behalf of a Covered Entity or Business Associate without having access to the decryption key. What is erasure coding? Similar to RAID, erasure coding stripes data into large number of pieces, introducing a redundancy of at least three pieces (meaning that up to three servers can fail without affecting data availability). However, with erasure coding, users need not wait for recovery (which is instant). Erasure coding also helps with detecting and repairing corrupted data. What third-party compliance requirements does Synology C2 meet? Synology C2's Europe (Frankfurt am Main) and APAC (Taipei) colocation data center facilities are certified up to the ISO 27001 standard, one of the strictest available security frameworks for information technology. Synology C2's US colocation data center facilities have achieved comprehensive SOC 2 Type II certification, confirming there are strict procedures in place to keep user data secure. Synology handles payment details in compliance with PCI DSS by processing and storing billing information with a PCI Level 1 Service Provider. Does Synology C2 offer Business Associate Agreements (BAA)? Yes. BAAs are currently available for C2 Object Storage, C2 Storage, C2 Backup, C2 Transfer, and C2 Password. Requests can be filed here. A representative will contact you to confirm the details and supply a digital copy of the agreement for you to sign.Sign up for the C2 newsletter
Register now to get the latest updates about C2 services, technical insights, activities, and events.
