We can transfer data using the Transport Layer Security (TLS) cryptographic protocol. We can store it on a virtual server at a facility with strictly controlled physical access. We can encrypt sensitive information using an Advanced Encryption Standard algorithm with a 256-bit key size (AES-256). What does that mean? The National Security Agency (NSA) requires its use for information classified as TOP SECRET. Seriously.
And HIPAA regulations? We know HIPAA regulations.
Capture the data you need. It's no fun to analyze junk data.
Simple tables and charts, or elaborate modeling techniques. Let's decide what's most appropriate.
Using an iPad? Another tablet? A mobile phone? Let's talk about how to optimize your application for your needs.
Bells and Whistles
Need mapping or geocoding capabilities? Automated reminders? Emailers? Text messaging? “Big data” needs? File storage? Spreadsheet or PDF creation? Let's make your system work for you.
In the old days, you could tear the cover sheet off a survey. In our modern, electronic world, that won't fly.
Although HIPAA only supplements other federal regulations (such at DHHS's Common Rule and FDA rules), state laws and institutional requirements – and some records fall under entirely different legislation, like the Family Educational Rights and Privacy Act (FERPA) for student education records – many people use the word as shorthand for a whole host of data concerns.
Privacy rule. Security rule. Data at rest. Data in flight.
For your enjoyment, the full list of 16 pieces of protected information under HIPAA.