Orange County NC Website
Consolidated Agreement FY14 Page 22 of 23 <br /> containing personal information along with the confidential process or key shall constitute a <br /> security breach. Good faith acquisition of personal information by an employee or agent of the <br /> business for a legitimate purpose is not a security breach,provided that the personal information' <br /> not used for a purpose other than a lawful purpose of the business and is not subject to further <br /> unauthorized disclosure. <br /> d. "Unsecured protected health information"means protected health information(PHI)that is not <br /> rendered unusable,unreadable,or indecipherable to unauthorized individuals through the use of <br /> technology or methodology specified by the Secretary in the guidance issued under section <br /> 13402(h)(2) of Pub.L.111-5. <br /> The following PHI shall not be regarded as Unsecured PHI: <br /> • Electronic PHI has been encrypted as specified in the HIPAA Security rule by the use of an <br /> algorithmic process to transform data into a form in which there is a low probability of <br /> assigning meaning without the use of a confidential process or key and such confidential <br /> process or key that might enable decryption has not been breached. To avoid a breach of <br /> the confidential process or key,these decryption tools should be stored on a device or at a <br /> location separate from the data they are used to encrypt or decrypt. The following <br /> encryption processes meet this standard: <br /> — Valid encryption processes for data at rest(i.e.data that resides in databases, file <br /> systems and other structured storage systems) are consistent with NIST Special <br /> Publication 800-111, Guide to Storage Encryption Technologies for End User Devices. <br /> Valid encryption processes for data in motion(i.e. data that is moving through a <br /> network,including wireless transmission) are those that comply, as appropriate,,with <br /> NIST Special Publications 800-52, Guidelines for the Selection and Use of Transport <br /> Layer Security(TLS)Implementations; 800-77, Guide to IPsec VPNs; or 800-113, <br /> Guide to SSL VPNs, and may include others which are Federal Information Processing <br /> Standards FIPS 140-2 validated. <br /> • The media on which the PHI is stored or recorded has been destroyed in the following <br /> ways: <br /> — Paper,film, or other hard copy media have been shredded or destroyed such that the <br /> PHI cannot be read or otherwise cannot be reconstructed. Redaction is specifically <br /> excluded as a means of data destruction. <br /> — Electronic media have been cleared,purged, or destroyed consistent with NIST Special <br /> Publications 800-88,Guidelines for Media Sanitization, such that the PHI cannot be <br /> retrieved. <br />