-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Mark Matthews wrote:

[snip]
> For example, besides containing regulations concerning techology for
> software that deals with artifacts that fall under HIPPA (but does not
> mandate _which_ technology to use), there are regulations about
> _physical_ security (i.e. who has access to the file cabinet, the server
> room, the fax machine, etc), administrative safeguards, as well as
> codifcation standards (ICD9's and the like, as well as other
> "Portability" issues, which is one of the "P"s in HIPPA) and any number
[snip]

Sorry, that should've been _the_ "P" in _HIPAA_ ;)

Finally managed to dig up the technology requirements from H&HS at
http://www.cms.hhs.gov/hipaa/hipaa2/regulations/security/nprm/sec14.asp

And of course, given these, a solution built on top of MySQL _can_ be
HIPAA-compliant (given that you meet the non-technology-related
regulations as well, which are probably harder to deal with). Of course,
these requirements apply to the system as a _whole_, but MySQL by itself
also meets the requirements.

> Requirement
> --------------
> Access control (The following implementation feature must be implemented: 
> Procedure for emergency access. In addition, at least one of the following 
> three implementation features must be implemented: Context-based access, 
> Role-based access, User-based access. The use of Encryption is optional).

There's emergency-based access, as well as user-based access in MySQL.
One can also, if they so desire use encryption.

> Audit controls

You can enable MySQL to create audit logs, with recording every query
issued by any user the time at which that query happened.

> Authorization control (At least one of the listed implementation features 
> must be implemented).
>       
> 
> Role-based access.
> User-based access.

MySQL has User-based access.

> Data Authentication (HIPAA's definition is "The corroboration that data has 
> not been altered or destroyed in an unauthorized manner. Examples of how data 
> corroboration may be assured include the use of a check sum, double keying, a 
> message authentication code, or digital signature.")

MySQL has cryptographic hashing functionality which meets this requirement.


> Entity authentication (The following implementation features must be 
> implemented: Automatic logoff, Unique user identification. In addition, at 
> least one of the other listed implementation features must be implemented).
>       
> 
> Automatic logoff.
> Biometric.
> Password.
> PIN.
> Telephone callback.
> Token.
> Unique user identification.

MySQL has automatic log-off capabilities (connection timeouts), as well
as unique user identification, and has passwords.

        -Mark


- --
Mark Matthews
MySQL AB, Software Development Manager - Connectivity
www.mysql.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFC86TDtvXNTca6JD8RAsvJAJ9Mhl9tiXFzpoZmocmVRmXXrxUClQCfZH2D
wXzjU3u4oAhicyenewPE2Z8=
=QGJH
-----END PGP SIGNATURE-----

-- 
MySQL General Mailing List
For list archives: http://lists.mysql.com/mysql
To unsubscribe:    http://lists.mysql.com/[EMAIL PROTECTED]

Reply via email to