Solutions for

Data Security for Healthcare

Advocate Health Care – who in August reported the second largest HIPAA data breach to date after four unencrypted laptops were stolen from its facility, compromising the protected health information and Social Security numbers of more than 4 million people – has now been slapped with a class action lawsuit filed by affected patients.

Two plaintiffs, representing patients affected by the breach, assert that Advocate Health Care failed to take the necessary precautions required to safeguard patients’ protected health information. The unencrypted laptops were stolen from an “unmonitored” room, one with “little or no security to prevent unauthorized access,” the lawsuit read.

Patients’ PHI, Social Security numbers and protected insurance information was improperly handled and stored, was unencrypted, and not kept in accordance with applicable and appropriate cyber-security protocols, policies.

Healthcare IT News
September 6, 2013

Securing confidential patient data is more important than ever – and it requires more than good intentions. It demands a comprehensive security solution built around strong encryption, robust identity management, and policy-based data management. This is especially true as hospitals and healthcare providers, insurers, pharmaceutical companies and others grow their ranks of mobile workers who carry or remotely access personally identifiable health information and R&D data.

Thanks to a lengthening list of regulations and standards, leakage of that information ― through theft, malware, spyware, or just plain carelessness ― can come with serious consequences. Some of those regulations include:

  • Health Insurance Portability and Accountability Act (HIPAA)
  • Health Information Technology for Economic and Clinical Health Act, (HITECH)
  • European Union Data Protection Directive (EUDPD)
  • UK Data Protection Act
  • Japan’s Personal Information Protection Act
  • Centers for Medicare & Medicaid Services (CMS) security requirements for Electronic Health Records (EHRs)
  • Evolving ASTM Standards for Medical Device Interoperability

Meeting these and other mandates is complex enough. But healthcare providers and related organizations are also under pressure to drive down costs and improve productivity.

Concerned About BadUSB?

Simplify Compliance, Improve Productivity, and More

Imation helps you achieve all these goals with military-grade encrypted devices, and we don’t stop there. Our mobile security solutions protect digital identities and applications no matter where your employees take them. Because our centralized management platforms put you in control of data access and use, you don’t have to rely on the diligence of the hundreds or thousands of mobile workers who carry sensitive corporate or patient data with them every day.

Imation delivers some of the world’s most secure, scalable and reliable mobile storage, identity management and device management solutions, including:

  • encrypted flash drives
  • encrypted external hard drives
  • secure portable workspaces
  • identity management solutions
  • cloud and on-premise device management solutions

All of these were designed from the start to work seamlessly together and create a cost-effective, end-to-end solution that you can use to reduce your potential exposure to non-compliance.

Features of the IronKey Healthcare Solution

Deploy the highest standards of mobile storage protection

The Imation IronKey™ family of flash drives and external hard drives, lock down patient information and other sensitive data with an on-board, hardware encryption engine that puts a military-grade, AES-256 wall between unauthorized users and the drive’s contents.

Maintain control over data access and use, conveniently and centrally

The security protections built into Imation’s encrypted USB drives are formidable. And by choosing from an array of scalable, intuitive platforms for establishing and policing your employees’ use of IronKey drives, you can ensure that mobile employees are using strong passwords and taking other measures to take full advantage of those capabilities. From a central console, set policies for passwords, application use, recovery, and more – across a handful of drives or thousands of them. Depending on the Imation solution you deploy, you can also manage and update device drivers and applications, administer identity protection features, and create whitelists of approved IP addresses to control where devices and applications can be used. And if a drive is lost or stolen, you can even remotely erase it or destroy it.

Protect digital identities away from the office

When a mobile employee’s digital identity is compromised, your network, your applications, and your data all become vulnerable. That’s why Imation offers strong, multifactor authentication (password, biometric and CAC/PIV) on Imation IronKey drives. And for users of IronKey flash drives, Imation offers enterprise-class identity management capabilities – combining PKI crypto services, two-factor authentication and strong password management – to shield identities out in the wild. Imation integrates these sophisticated protections with encrypted storage in a single mobile device.

Simplify reporting, auditing and other burdens of compliance

Passing your HIPAA audit doesn’t have to be a headache. Use Imation’s advanced reporting and auditing capabilities to document how, where and when users have accessed, saved or modified confidential data. And for maximum flexibility, Imation offers you both premise-based management solutions (when device management must reside behind your firewall) and cloud-based management solutions (eliminates the need for capital investments in servers and other hardware).

Shield data and applications from malware

In addition to the combined safeguards of encryption, multi-factor authentication and hardened enclosures, Imation’s enterprise-class mobile storage solutions come with anti-virus and anti-malware protections, either as a standard feature or as an option.

Don’t let security get in the way of productivity

Mobile data security involves more than just locking down data. Workers need the flexibility of working from any PC, and they get it with Imation’s portable workspace solutions. These solutions, available on Imation’s encrypted USB flash drives, add another dimension to mobile security by enabling employees and contractors to safely work from any computer – at the office, at home, or on the road – with a fully functioning Microsoft Windows 8.1 desktop environment that goes everywhere they do and features all the applications workers need. Hardware encryption and strong authentication keep protected patient data where it belongs, and the portable workspace is isolated from malware or other threats that may be present on the host computer, keeping them out of your datacenters and your networks.

Empower mobile workers with simple, user-friendly solutions

There’s no need for employees to install drivers or other software to securely access their stored data, workspace or applications. Imation drives come pre-loaded with everything users need, and they leave no trace on the host PC.

Recover from disasters without missing a beat

Power outages, severe storms, earthquakes, fires – any of these might usually impact your ongoing operations. But Imation’s secure mobile storage and portable workspace solutions help keep workers productive even when they can’t make it into the office.

Take the Worry out of Securing and Managing Mobile Data

Few firms can afford the millions of dollars that data breaches can cost – penalties, settlements, mitigation measures can add up quickly. That’s why healthcare organizations around the world rely on Imation for mobile security solutions that meet the highest standards of protection. Imation helps reduce the cost of securing data, simplify compliance, and keep employees and contractors productive in the office, at home or on the road.

Featured Resources

White Paper

Windows To Go: Empower and Secure the Mobile Workforce


White Paper

Securely Enabling Remote Workers at Lower Cost than Traditional Approaches with IronKey Workspace W500 and W700



Detailed product demo on IronKey’s secure workspace solutions

Watch Now