Home User Manual Discussion Forum Search

Encryption of Data 'at rest' and 'in transit'

The information below is provided as a resource when making encryption decisions. Open Dental does not provide technical support for encryption.  Instead consult your IT professional. 

Encryption of data prevents unauthorized users from viewing data (PHI) when there is a data breach (e.g. hacking, theft, or loss of data). HIPAA does not require encryption of data, however it is recommended. If there is a data breach, practices that have encrypted their data can qualify for Safe Harbor. Practices that have not encrypted the data must inform every patient that medical records have been compromised, and in some circumstances, notify the media.

Your encryption plan needs to include data 'at rest' and 'in transit', as well as any other PHI that you have on your systems. Documenting your data security policy is very important, as the burden of proof may rest upon you if there is a data breach.

Encryption of Stored Data ('at rest')
Your encryption plan needs to include the data that is stored by Open Dental.

  • Database: A database, generally MySQL, stores your patient data. By default, it is located at C:\MySQL\Data\OpenDental\. 
  • Folder for Images and Documents (A to Z Folders): This folder stores files that you scan or import. See Data Paths to determine the path.
  • Backups should also be encrypted.

Below are two options for encrypting stored patient data. 

  • BitLocker Drive Encryption. This is the recommended method for the database and A to Z Folders, if you have a compatible Operating System.  BitLocker encrypts an entire drive in a manner that avoids the more complex EFS method of certificates associated with individual Windows users.
  • Encrypting File System (EFS). Works well for the database because only the MySQL database service accesses the files, and this service always runs under one Windows user. It does not work well for the A to Z folders because it does not work well for files that are shared to multiple users.

Encryption of Data 'in transit'
Data 'in transit' refers to data that is moved from one place to another and therefore could be intercepted by someone else. This includes data that is transported across a network or stored on a removable storage device.

Removable storage device: Use hardware encryption (e.g. encrypted hardware drives, encrypted USB drives) or software encryption (e.g. Bitlocker).

Data that is transported across a network: Open Dental does not move patient data off of your network in any automated fashion. However, there are optional features that involve sending patient data to, or from, your Open Dental database.

Encryption Method
Other Details

Varies by clearinghouse

Communication of insurance claim information by Open Dental is always secure. Contact the clearinghouse to determine their method.

  • Some clearinghouses have Open Dental send the data via a secure HTTPS connection or SFTP (Secure File Transfer Protocol).
  • Many clearinghouses have Open Dental create the claim data locally on the client machine, then proprietary client uploads software that moves the data securely to their servers. Contact the clearinghouse to address encryption in transit.
Electronic Prescriptions
    Plain text email
Do not send PHI using regular plain text email. Thus do not include PHI when emailing recalls or confirmations or manually composing emails. To securely email statements use Electronic Statements.
    Encrypted email
It can be tedious to set up encrypted email and share public email keys with recipients ahead of time. We recommend using Secure Web Mail instead.
(formerly known as Rijndael)

This applies to the communication between Open Dental's secure servers and your practice computers. Advanced Encryption Standard (AES) is a standardized encryption specification established by the U.S. National Institute of Standards and technology (NIST) that complies with the Federal Information Processing Standard (FIPS) as set forward by the federal government in regard to security of data in transit. We use a 24 byte (192 bit) key, which falls well within the guidelines set by the federal government.

Used for all eServices that use the eConnector:

   Browser interface for:

  • eConfirmations
  • Mobile App
  • Patient Portal
  • Web Sched (Recall, New Patient, ASAP)
HTTPS over SSL via TLS 1.2
Mobile Web: Data is not stored on the mobile device so PHI is not lost if device is lost or stolen.
   Secure Web Mail
Recommended as a two-way encrypted communication method with patients. You can even set up portal accounts for providers with whom you regularly communicate so you can exchange PHI with them. See Send Secure Messages to another Provider.
   Sending/Receiving Text Messages
  Do not send PHI using text messaging. Thus do not include PHI when texting confirmations or manually composing texts.
   Web Forms
Also see Web Form Encryption and Security.

If using Middle Tier, for external communication you must set up HTTPS over SSL.

Sending PHI via Email or Text Messages
In general, PHI should not be sent via plain text email or text message, even if using Open Dental for those communications. By default, eReminders, eConfirmations, and Web Sched notifications do not send PHI, however you can manually compose messages that do include PHI. We do not recommend it.

To securely communicate with your patients, we recommend setting up Patient Portal accounts. Then you can use Secure Web Mail for secure two-way communication. You can even set up portal accounts for providers with whom you regularly communicate so you can exchange PHI.

While you can set up Standard Encrypted Email, it can be painful because you must manually set up the encryption with each recipient ahead of time (share a public key).

PHI in Emailed Statements: If sending statements by email from Open Dental, make sure the patient has given you permission to send the PHI and that you have documented it on a by-patient basis. To send statements via email without worrying about permission, use a secure service like Claim Connect. See E-Statements.

Technical Details
Open Dental supports modern secure cryptographic protocols that provide communication security over computer networks. The browser interfaces for eServices utilize the Transport Layer Security (TLS) 1.2 protocol as defined by RFC 5246 and further refined by RFC 6176 to remove backward compatibility with Secure Sockets Layer (SSL) such that TLS sessions never negotiate the use of SSL version 2.0.

Secured data transmitted to and from customers and patients is and remains secure in transit. Open Dental has never used OpenSSL or any other vulnerable SSL implementation. Heartbleed (http://heartbleed.com/) is a much publicized security flaw in OpenSSL announced on April 7, 2014 that had been vulnerable for about two years. Open Dental services that transmit data do not and have never used OpenSSL and do not have this weakness. Open Dental uses Microsoft's Internet Information Services or IIS instead, which is not affected and remains secure.


Open Dental Software 1-503-363-5432