Tag Archives: HIPAA

Globus can now be used with Armis2 

Researchers who have an Armis2 High-Performance Computing account can now move data to and from other Protected Health Information (PHI)-approved systems using Globus File Transfer. (The endpoint is umich#armis2.)  To learn more about your responsibility and approved services, visit the Sensitive Data Guide and the Protected Health Information (PHI) webpage on the Safe Computing Website. Send an email… Read More »

New training course: Practical guidance on HIPAA and Protected Health Information

Do people in your unit need training on meeting HIPAA requirements for working with Protected Health Information (PHI)? A new eLearning course in My LINC covers how to appropriately handle PHI in accordance with the Health Insurance Portability and Accountability Act (HIPAA). HIPAA provides privacy and security rules that govern how PHI is collected, disclosed, and secured. For… Read More »

Changes coming in 2021 to Zoom for Health

By | December 23, 2020

U-M Zoom has been approved for PHI (HIPAA data). As a result, Zoom for Health at U-M will be consolidated into regular U-M Zoom January 2–3, 2021. New features Thanks to collaborative efforts of U-M and Zoom, users will be able to use expanded features, such as: Cloud recording Live transcription Viewing identifying information in reports Ability to… Read More »

Collaboration on new HIPAA course for the Shared Services Center

Staff in the Shared Services Center (SSC) play an important role in properly handling sensitive institutional data, including data regulated by the Health Insurance Portability and Accountability Act (HIPAA). This past summer, the SSC decided it was time to update their HIPAA training, which they require annually of their staff.  The SSC noticed that Information and Technology Services… Read More »

Yottabyte now HIPAA-compliant

Computing platform Yottabyte Research Cloud (YBRC), offered through Advanced Research Computing – Technology Services (ARC-TS), is now HIPAA-compliant. YBRC and its associated services can accept restricted data, enabling secure data analysis on Windows and Linux virtual desktops as well as secure hosting of databases and data ingestion. The new capability ensures the security of restricted data through the… Read More »