> For example, there are HIPPA access control requirements that demand that you 
> only give doctors access to transmit patient data in a minimal way; only 
> transmitting data needed for a diagnosis. Good luck coding that. It's also 
> bad medicine.

Sounds like contextual access control to me - someone wrote a pretty good blog 
about that once :)

I do however, agree on the bad medicine point - just like in diagnosing 
software bugs, often something seemingly unrelated to the problem you are 
addressing is either a contributing factor or the root of the problem itself! 
This is why engineers should be the ones writing the standards instead of 
standards authors. :)

Sent from my iPwn

On Apr 26, 2011, at 12:19 PM, James Manico <j...@manico.net> wrote:

> Rohit,
> 
> The most cost-effective way to handle these requirements is to get your HIPPA 
> auditor drunk nightly.
> 
> I'm being partially serious here because these and other HIPPA requirements 
> are:
> 
> (1) Technically ambiguous
> (2) Often in conflict with other HIPPA requirements
> (3) Impossible to achieve cost effectively
> 
> For example, there are HIPPA access control requirements that demand that you 
> only give doctors access to transmit patient data in a minimal way; only 
> transmitting data needed for a diagnosis. Good luck coding that. It's also 
> bad medicine.
> 
> And now, let me leave you with a few lyrics from the Bon Jovi song "bad 
> medicine". He was singing about medical software, I'm fairly sure:
> 
> "I ain't got a fever got a permanent disease
> And it'll take more than a doctor to prescribe a remedy
> And I got lots of money but it isn't what I need
> Gonna take more than a shot to get this poison outta me
> And I got all the symptoms, count 'em 1, 2, 3"
> 
> ;)
> Jim Manico
> 
> On Apr 26, 2011, at 2:35 AM, Rohit Sethi <rkli...@gmail.com> wrote:
> 
>> Hi all,
>> 
>> Has anyone had to deal with the following HIPAA compliance requirements 
>> within a custom application before:
>>  
>> 
>> §164.312(c)(2)
>> 
>> Implement electronic mechanisms to corroborate that electronic protected 
>> health information has not been altered or destroyed in an unauthorized 
>> manner.
>> 
>>  
>> 
>> §164.312(e)(2)(i)
>> 
>> Implement security measures to ensure that electronically transmitted 
>> electronic protected health information is not improperly modified without 
>> detection until disposed of.
>> 
>> 
>> 
>> How have you actually implemented these controls in applications? Have you 
>> used a third party tool to do this? Does §164.312(c)(2) simply boil down to 
>> sufficient access control?
>> 
>> -- 
>> Rohit Sethi
>> SD Elements
>> http://www.sdelements.com
>> twitter: rksethi
>> 
>> _______________________________________________
>> Secure Coding mailing list (SC-L) SC-L@securecoding.org
>> List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
>> List charter available at - http://www.securecoding.org/list/charter.php
>> SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
>> as a free, non-commercial service to the software security community.
>> Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
>> _______________________________________________
> 
> _______________________________________________
> Secure Coding mailing list (SC-L) SC-L@securecoding.org
> List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
> List charter available at - http://www.securecoding.org/list/charter.php
> SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
> as a free, non-commercial service to the software security community.
> Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
> _______________________________________________
_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
_______________________________________________

Reply via email to