At mentioning many community members that have shown interest in HIPAA before
We would appreciate your input into this question, trying to figure out what is best for our customers.
Context: Jira and Confluence notifications, as you know these can be quite rich and include content captured in Confluence Pages and Jira Issues, because of this we have to be concerned about PHI in Notifications (email - push), we can't control end to end security for it.
We are considering what is the best way for us to ensure PHI is properly protected...
Appreciate your comments - thoughts about these or any other suggestions you want to offer
@Thomas B , @Ankit Maheshwari , @Martin Hanna , @Fernando De Oro , @Zvika Ekhous , @Craig Tucker , @Teresa L Coakley , @Jaswanth P , @Craig Tucker , @Xiaofeng Guo , @Jenn Winship , @Lloyd W Mangnall, CISSP, CHCIO , @Anna Coffey , @Lovekush Gangwar , @Gene McKenna , @Brian Reavey , @Ram Tummala , @Phillip Hocking , @Kyle Hughes , @Tim Fostik , @Jason Michaud , @Scott Checkoway , @gillamc , @Harold Wong , @Jamie Hess
Great response! I would echo this entirely with one minor exception. If both email servers support and encrypt via TLS and only send when a TLS connection can be established, then TLS is HIPAA compliant. It is not TLS per se, that is not HIPAA compliant, it is the implementation of TLS.
Agree with the point @Jamie Hess made above, we can likely configure things so that the notification will be bounced in that case, which would mean a lost communication. Would that be acceptable?
I don't want to speak for the whole community but yes, that would be acceptable. If possible, it would be helpful to see a notice or alert about a "misconfigured TLS" to preemptively fix it first.
There are strong indications that PHI in email is simply to be avoided:
SUMMARY
Do not send emails containing PHI outside of your network. Instead, use secure services like patient portals. However, if you need to send emails, avoid using free Internet-based email services and make sure to encrypt all PHI in both rest and transit.
That is not the case at all. PHI in "unencrypted, insecure" email is to be avoided.
Thank you for the detailed response @Phillip Hocking. I agree with a lot of what is being said here as trying to make it as rich without sharing ePHI or other sensitive information. I'm sure something could be configured as there are systems out there that scan the data within emails for either SSN or ICD-10 codes/references to build a score to determine if enough meets ePHI to auto encrypt. We use a system like this for our emails where we can define what needs to be automatically secured. My concern is how do you control what data goes into notifications that allow the rich information without exposing ePHI when an end user could enter it within the summary or description or any other field that is configured to display within the notification.
I'm not sure any of that provided valued feedback, but like @Jamie Hess said, emails unencrypted/unsecured should be avoided at all cost. Our organization targets safe harbor guidelines as much as possible so the data needs to be encrypted in transit and at rest.
Excellent thread going on here! Ultimately clients are going to send PHI in Email, even when asked or advised not to. It's not enough to just redact information or have encryption (which would be required as indicated above), having the BAA and all the appropriate certifications are crucial to ensure the protections are in place as our healthcare clients expect.
I would like to note that, while TLS alone encrypts email during transit, the mail will still be stored unencrypted on the mail server. Therefore, we think S/MIME or PGP encrypted emails are still necessary to fully comply to HIPAA if emails may contain PHI.
As quoted above: "make sure to encrypt all PHI in both rest and transit." TLS encrypts in transit, but not in rest.
Have you considered encrypting the email notification. I see a ticket on this: https://jira.atlassian.com/browse/JRASERVER-43585
Hi @Jigesh.Veetil , please see the comments on a similar response above and let me know what you think
There is a solution to this, and it's email encryption. We have published an app that provides email encryption, and we know that some of our customers use it specifically in order to comply to HIPAA. The ticket @Jigesh.Veetil mentions also refers to our app, and that ticket was one of the reasons why we decided to develop our app. (Another reason was that we needed email encryption ourselves.)
However, while our solution works well for Server and Data Center, we do not have a solution for Cloud yet. This is mainly because Atlassian does not yet provide any way for apps to access email notifications before they are sent which is what we would need in order to be able to encrypt them. We have filed a feature request with Atlassian since long, but it remains on status "triage". If Atlassian were to work with us on behalf of this, we would be happy to provide our app solution for Cloud.
Public tickets on behalf of this:
Some notification needs to be sent. Having a system you have to check on regularly, given most health professionals workloads, is not efficient. Just a notification saying, "there's be an update to your ticket, click here to view" would suffice. We already use that notification functionality with another jira client (as end users) and it works well!
Hey everyone,
I'm Michelle, the Product Manager who’s been looking after Jira Service Management’s Customer Notifications and Compliance/Regulation features. We're currently working towards HIPAA compliance for Jira Service Management and have rolled out a feature this week that will help you meet your organization’s compliance needs and protect your and your customers' data!
I'd love for you to try out our feature and give us early feedback on the user experience as we work towards meeting HIPAA and signing BAAs in the coming months. 😊
Online forums and learning are now in one easy-to-use experience.
By continuing, you accept the updated Community Terms of Use and acknowledge the Privacy Policy. Your public name, photo, and achievements may be publicly visible and available in search engines.