Encryption of Data at Rest and in Transit
The information below is provided as a resource when making encryption decisions related to Computer Security. Open Dental does not provide technical support for encryption. Instead consult your IT professional.
Encryption of data prevents unauthorized users from viewing data (PHI) when there is a data breach (e.g. hacking, theft, or loss of data). HIPAA does not require encryption of data, however it is recommended. If there is a data breach, practices that have encrypted their data can qualify for Safe Harbor. Practices that have not encrypted the data must inform every patient that medical records have been compromised, and in some circumstances, notify the media.
Your encryption plan needs to include data at rest and in transit, as well as any other PHI that you have on your systems. Documenting your data security policy is very important, as the burden of proof may rest upon you if there is a data breach.
Your encryption plan needs to include the data that is stored by Open Dental.
Below are two options for encrypting stored patient data.
Data in transit refers to data that is moved from one place to another and therefore could be intercepted by someone else. This includes data that is transported across a network or stored on a removable storage device.
Removable storage device: Use hardware encryption (e.g. encrypted hardware drives, encrypted USB drives) or software encryption (e.g. Bitlocker).
Data that is transported across a network: Open Dental does not move patient data off of your network in any automated fashion. However, there are optional features that involve sending patient data to, or from, your Open Dental database.
|Feature||Encrypted?||Encryption Method||Other Details|
|E-Claims||Yes||Varies by clearinghouse||Communication of insurance claim information by Open Dental is always secure. Contact the clearinghouse to determine their method.
|eRx Companies||Yes||HTTPS over SSL|
|Plain text email||No||Do not send PHI using regular plain text email. Thus do not include PHI when emailing recalls or confirmations or manually composing emails. To securely email statements use Electronic Statements.|
|Encrypted Email||Yes||It can be tedious to set up encrypted email and share public email keys with recipients ahead of time. We recommend using Secure WebMail Feature instead.|
|eConnector||Yes||AES (formerly known as Rijndael)||This applies to the communication between Open Dental's secure servers and your practice computers. Advanced Encryption Standard (AES) is a standardized encryption specification established by the U.S. National Institute of Standards and technology (NIST) that complies with the Federal Information Processing Standard (FIPS) as set forward by the federal government in regard to security of data in transit. We use a 24 byte (192 bit) key, which falls well within the guidelines set by the federal government.Used for all eServices that require the eConnector.|
|Browser interface for:||Yes||HTTPS over SSL via TLS 1.2||Mobile Web: Data is not stored on the mobile device so PHI is not lost if device is lost or stolen.|
|Secure WebMail Feature||Yes||HTTPS over SSL||Recommended as a two-way encrypted communication method with patients. You can even set up portal accounts for providers with whom you regularly communicate so you can exchange PHI with them. See Secure WebMail.|
|Sending/Receiving Text Messages (Integrated Texting Feature)||No||Do not send PHI using text messaging. Thus do not include PHI when texting confirmations or manually composing texts.|
|Web Forms Feature||Yes||HTTPS over SSL||Also see Web Form Security.|
If using Middle Tier, for external communication you must set up HTTPS over SSL.
In general, PHI should not be sent via plain text email or text message, even if using Open Dental for those communications. By default, eReminders, eConfirmations, and Web Sched notifications do not send PHI, however you can manually compose messages that do include PHI. We do not recommend it.
To securely communicate with your patients, we recommend setting up Patient Portal accounts. Then you can use Secure WebMail for secure two-way communication. You can even set up portal accounts for providers with whom you regularly communicate so you can exchange PHI.
While you can set up Standard Encrypted Email, it can be painful because you must manually set up the encryption with each recipient ahead of time (share a public key).
PHI in Emailed Statements: If sending statements by email from Open Dental, make sure the patient has given you permission to send the PHI and that you have documented it on a by-patient basis. To send statements via email without worrying about permission, use a secure service like ClaimConnect.
Open Dental supports modern secure cryptographic protocols that provide communication security over computer networks. The browser interfaces for eServices utilize the Transport Layer Security (TLS) 1.2 protocol as defined by RFC 5246 and further refined by RFC 6176 to remove backward compatibility with Secure Sockets Layer (SSL) such that TLS sessions never negotiate the use of SSL version 2.0.
Secured data transmitted to and from customers and patients is and remains secure in transit. Open Dental has never used OpenSSL or any other vulnerable SSL implementation. Heartbleed (heartbleed.com) is a much publicized security flaw in OpenSSL announced on April 7, 2014 that had been vulnerable for about two years. Open Dental services that transmit data do not and have never used OpenSSL and do not have this weakness. Open Dental uses Microsoft's Internet Information Services or IIS instead, which is not affected and remains secure.