Skip to Main Content

Data Security: Policies and Regulations Impacting Research Data: HIPAA Requirements

Security considerations in managing sensitive data.

Library Data Services

Library Data Services caters to researchers interested in working with data, mapping, texts, visualization, and technology. Many of these services are available online. Davis Library Data Services, located on the second floor of Davis Library, offers:

  • A computing lab with specialized software for GIS and data visualization & analysis.
  • Walk-in assistance provided by knowledgeable student consultants during set hours
  • Consultations with specialists for more in-depth inquiries (by appointment).
  • Spaces for collaboration and presentation, complete with white boards and external displays.
  • Technology short courses and programs that promote digital scholarship.

What Is HIPAA?

HIPAA stands for Health Insurance Portability and Accountability Act.  It provides federal protections for personal health information held by covered entities (in this case, UNC).  HIPAA gives patients rights in respect to this information.  The HIPAA Security Rule specifies a series of administrative, physical, and technical safeguards to ensure confidentiality, integrity, and availability of electronic protected health information or e-PHI. The Security Rule is designed to be flexible and scalable so a covered entity like UNC can implement policies, procedures and technologies that are appropriate for its particular size, organizational structure, and risks to consumers.

What Are UNC's Responsibilities?

As a covered entity UNC has a responsibility to protect e-PHIs.  This includes the following:

  • Ensure the confidentiality, integrity, and availibility of all e-PHI records created, recieved, maintained or transmitted.
  • Identify and protect against reasonably anticipated threats to the security or integrity of the information.
  • Protect against reasonably anticipated impermissable uses or disclosures.
  • Ensure compliance by the UNC workforce.

UNC HIPAA Training Resources

How Should Data Be Secured?

  • Follow campus security policies.
  • Conduct and update risk assessments of systems and data.
  • Keep good records of what is protected.
  • Store data on a centrally managed server.
  • Encrypt the laptops and workstations that process sensitive data.
  • Put server behind a SOM or ITS firewall.
  • Use encryption technology on data (Such as PGP Netshare, or TrueCrypt)

Continue...