Orange County NC Website
referenced by HHS and ensure that those resources are furnished to appropriate <br /> parties. <br /> 2. Whenever possible, North State Medical Transport shall convert all paper and hard copy <br /> PHI into electronic format and then secure it consistent with encryption methods <br /> outlined in this policy. Paper or other hard copy PHI should be scanned or otherwise <br /> converted into digital format and then the original hard copy should be shredded or <br /> destroyed in a manner that ensures that the PHI can no longer be read or otherwise <br /> reconstructed. If North State Medical Transport utilizes an outside agency to shred, <br /> destroy or digitize paper and hard copy PHI, North State Medical Transport shall enter <br /> into a business associate agreement with that outside party. <br /> 3. All e-PHI created, received, maintained or transmitted by North State Medical Transport <br /> must be encrypted through the use of an algorithmic process that transforms data into a <br /> form in which there is a low probability of assigning meaning without use of a <br /> confidential process or key. All encryption keys must be stored in a different location <br /> than the data which it is meant to decrypt. North State Medical Transport shall adhere <br /> to the following guidelines when encrypting PHI data in various forms: <br /> a. PHI at Rest. For PHI data that is "at rest," (i.e., PHI in databases, file systems, stored <br /> on flash drives, electronic device memory, and other structured storage methods), <br /> North State Medical Transport shall utilize encryption processes that are consistent. <br /> with NIST Special Publication 800-111, "Guide to Storage Encryption Technologies for <br /> End User Devices." (available at www.nist.gov) <br /> b. PHI in Motion. For PHI data "in motion," (i.e., PHI that is being transmitted through <br /> a network, wireless transmission, email, or other electronic transmission), North <br /> State Medical Transport shall utilize encryption processes that comply with the <br /> requirements of Federal Information Processing Standards ("FIPS") 140-2. These <br /> include standards described in NIST Special Publications 800-52, "Guidelines for the <br /> Selection and Use of Transport Layer Security(TLS) Implementations;" Special <br /> Publication 800-77, "Guide to IPsec VPNs;" or Special Publication 800-113, "Guide to <br /> SSL VPNs," and may include others which are FIPS 140-2 validated. (NIST Special <br /> Publications available at: www.nist.gov). <br />