Skip to content

DriveSavers is the only data recovery service provider in the industry to post proof that it has met all HIPAA data security and privacy compliance standards. This helps ensure that DriveSavers is a certified secure data recovery provider. Our customers in the health care industry know that DriveSavers can preserve the integrity of their electronic protected health information.

—Michael Hall, CISO, DriveSavers

About HIPAA Security Compliance

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Omnibus rules were created to protect the privacy and security of certain health information.

  • The HIPAA Privacy Rule protects the privacy of individually identifiable health information.
  • The HIPAA Security Rule sets national standards for the security of electronic protected health information (EPHI).

The Health Information Technology for Economic and Clinical Health (HITECH) Act expanded the responsibilities and liabilities of business associates under the HIPAA Privacy and Security Rules.

VIEW OUR HIPAA CERTIFICATION

Who Must Comply with HIPAA?

Health care providers, health plans, health care clearinghouses, Medicare prescription drug card sponsors and other health care service providers who generate, use, transmit and store electronic patient records must comply with HIPAA standards.

These 'covered entities' face financial, legal and reputational repercussions if their patient’s sensitive information is stolen, misused, or unavailable. Preventing an unauthorised breach of protected health information (PHI) is a core goal of every covered entity in the health care industry.

Any business partner, vendor and service provider that handles PHI on behalf of a covered entity must also comply with HIPAA guidelines.

DriveSavers — Compliant with HIPAA Security Standards

WiRED Security, an independent third-party, performed facility reviews, documentation reviews and interviewed key personnel at DriveSavers to measure our data recovery process controls. WiRED Security is certified to conduct IT Audits and Information Security Vulnerability and Penetration Testing.

In addition to their own auditing process, WiRED Security relied upon SOC 2 Type II audits and control testing performed by two independent parties in 2016 to validate the effectiveness of DriveSavers technical security controls.

The SOC 2 Type II audit is a widely recognised as the standard developed by the American Institute of Certified Public Accounts (AICPA) for the assessment of service organisations. Professionals who have experience in accounting, auditing and information security perform the audit.

The SOC 2 Type II audit is an intensive process, requiring months of preparation. DriveSavers undergoes the Type II SOC 2 audit on an annual basis. DriveSavers pursued the SOC 2 Type II audit voluntarily to verify the following for our customers:

  • The integrity of our data recovery facilities and data hosting solutions
  • The security of our IT assets
  • Our compliance with the Sarbanes-Oxley (SOX) Act of 2002 and other data privacy and data security compliance regulations
  • Our overall IT compliance.

Certified Secure Recovery of Electronic PHI

Annual SOC 2 Type II audits are the most stringent form of professional examination. The security control objectives established for our audits are designed to satisfy the stringent security requirements mandated by the corporate clients, health care service providers and government agencies we serve.

The following areas were examined, tested and certified:

  • Control environment
  • Computer and network operations
  • Data communications
  • Network security
  • Physical security
  • Business-environment security
  • Logical security
  • Business continuity and disaster-recovery planning
  • Change management for applications and solutions
  • Executive and senior management
  • Decision-making processes
  • Human resources

SOC 2 Type II

An annual SOC 2 Type II audit verifies our qualifications to handle enterprise-class recoveries, and support those customers who must maintain compliance with data privacy and data security regulations such as:

  • NIST (National Institute of Standards & Technology) SP 800.34 (Rev.1)
  • HIPAA (Health Insurance Portability and Accountability Act)
  • SOX (Sarbanes-Oxley Act of 2002)
  • GLBA (Gramm-Leach-Biley Act of 1999)
  • FERPA (Family Educational Rights and Privacy Act)
Back To Top
Search