HIPAA

 

What is HIPAA

The Health Insurance Portability and Accountability Act (HIPAA) is a federal regulation developed by the U.S. Department of Health and Human Services, covering ‘health’ related data use.

Its not related to GDPR, but here as a close related topic. See https://www.atlassian.com/trust/compliance/resources/hipaa for more context.

Atlassian FAQ’s

Customer Facing FAQ answers from Atalssian:https://atlassianpartners.atlassian.net/wiki/spaces/resources/pages/342655180/HIPAA+Compliance+Overview

Question

Response

Question

Response

Why is Atlassian expanding HIPAA availability across all paid plans?

We listened to customer feedback and an overwhelming amount of smaller teams expressed the need for HIPAA compliance. We believe in a cloud-first future for all of our customers and decided to invest in additional automation that would enable us to expand HIPAA compliance beyond the Enterprise plan. We are currently working through the details of implementation and will share once HIPAA is available across all paid plans.

Our Enterprise plan continues to be the best choice for enterprise customers and includes a number of features like BYOK, mulitple instances, Atlassian Analytics, and Atlassian Access included for free with every purchase.

Will Atlassian sign customer BAAs?

 

No, Atlassian’s BAA is carefully and specifically drafted and structured to reflect the manner that Atlassian offers its products and services, and Atlassian’s privacy and security program.  Due to our company’s emphasis on providing high-quality products to a large customer base under a uniform compliance program, we do not sign customer BAAs. However, we do listen to customer feedback, track and collect it, so if you have some feedback on our BAA, please let us know.

Are marketplace apps included in this compliance?

No, our BAA only covers Jira Software Cloud, Confluence Cloud, and JSM Cloud products. Marketplace apps integrated with Atlassian products are not covered by a Customer’s BAA with Atlassian. Customers must assess their use of each marketplace app and determine if they need a BAA with the app in order to meet their compliance needs.

Atlassian Platform HIPAA support

Atlassian provides comprehensive privacy and security protections that enable customers to operate Atlassian products in compliance with HIPAA.

In the page. There you will find about how you sign a Atlassian Business Associate Agreement (BAA) with Atlassian and how you would configure the Atlassian Products to safeguard data that Atlassian hold.

Marketplace Apps HIPAA support

Marketplace apps are not in scope for the Atlassian signed BAA. Our cloud app JEMHC has no concept of HIPAA data and categorizations that you make on the Atlassian Product, we don’t extract/store data ourselves, the bare minimum information is stored (i.e. email addresses/personal names) for inbound/outbound auditing purposes. JEMHC is a tool, you can use it to extract data from the ‘source’ email content and store in your Jira instance in those pre-defined HIPAA fields.

The page states that:

All third-party apps integrated with Atlassian products also need to be operated in a HIPAA-compliant way. This means you must have a signed Business Associate Agreement (BAA) with all relevant third-party apps.

As we see it, enabling HIPAA is done at the Atlassian Product (Jira/Confluence) level in order to apply “protection” to specific typed/identified/tagged data holding entities like Jira Custom Fields, limiting search and (I we expect) remote access from apps like JEMHC.

HIPAA compliance

According to there is no official HIPAA certification. As yet we have not been audited for HIPAA compliance.

We are currently on a SOC2 compliance journey, do not have capacity for HIPAA compliance as well. Once we have SOC2, HIPAA will be possible.

How We/JEMHC enable HIPAA compliance

Based on , in the fullness of time, we will complete the following:

Risk management

Reduce risks and vulnerabilities, conduct periodic technical, and nontechnical evaluations in response to environmental or operational changes

We perform a risk assessment annually that include the identification, assessment, assignment, acceptance, remediation, and other relevant management activities, to ensure we operate within the agreed upon risk appetite and relevant legal and regulatory requirements. We continuously evaluate the design of controls and mitigation strategies, including recommending changes in the control environment. We maintain a risk and controls matrix within our Governance, Risk, and Compliance (GRC) tool.

Workforce security

Background screening and proper termination procedures

Our employees and contractors that have access to confidential information are bound by their employment contracts and confidentiality deeds to ensure that information security responsibilities and duties remain valid after termination, or change of employment, as well as the end of contractual relationships.

Sanctions against workforce members

Formal sanctions exist and are employed for individuals failing to comply with established information security policies and procedures.

Information access management

Authorization of access for employees who work with ePHI

Privileged access to production environments is restricted to authorized and appropriate users only.

All staff participate in support and all have access to Jira/data you supply for that purpose.

Appropriate granting of access (least privileged basis)

We employ policy based permission schemes for cloud infrastructure.

Only office based staff have access to our internal network.

Terminate a session after predetermined time of inactivity

Office powers down nightly, so 8hrs is the max office session life.

OS lock after 5m of inactivity. A screensaver is enforced with a requirement to enter a password to unlock it.

Incident response management

Audit logging/detection (including monitoring of login attempts)

AWS logs are retained for 12months. We have very limited data logged.

Identify and respond to suspected or known security incidents. Mitigate and document the incidents and their outcomes

We have implemented an incident management process comprising:

  • recording every action, when managing an incident, into the Incident Management System under an incident ticket. Records must include:

    • incident start time

    • incident description

    • severity

    • services affected

    • impact

    • number of affected customers

    • root cause

    • actions taken

    • affected SLOs (capabilities impacted)

  • associating problems, where possible, with the underlying cause and/or grouping them together into parent incidents

  • completing a Post Incident Review (PIR) after Major and Critical Incidents

Security responsibility

Identify an individual responsible for the development and implementation of the HIPAA security compliance program

Andy Brook, CEO

Privacy responsibility

Identify an individual responsible for the development and implementation of the HIPAA privacy compliance program

Andy Brook, CEO.

Our GDPR contact addresses are as follows:

Security awareness and training

User awareness training

To do.

Contingency planning

Procedures to enable continuation of critical business processes

We have defined, reviewed, and tested procedures for Disaster Recovery execution. The policy describes, at a high level, the purpose, objectives, scope, recovery time objective, recovery point objective, and roles/responsibilities.

DR planning is ongoing. Our JEMHC app has been designed for high availability and will automatically recover from any individual node failures.

In support of contingency plan components, we assess services and systems for their criticality annually.

Business associate contracts

Business Associate Agreements contain satisfactory assurances that your data will be appropriately safeguarded by Atlassian and third party suppliers

We have Data Processing Agreements in place with all our sub-processors. BAA’s have not yet been progressed.

Physical security and endpoint controls

Safeguard physical facilities and equipment from tampering or theft

An access dongle is required for physical building and security door access. Terminated staff have dongle physically taken/revoked. Terminated staff development machines are rebuilt.

Implement physical safeguards for all workstations that access ePHI

We implement full disk encryption on all workstations and laptops, use password lock, and apply security patching.

In the rare event Removable media is required, such USB sticks are also fully encrypted.

Procedures to address the final disposition of ePHI and the hardware on which it is stored

We wipe any laptop returned before it is redeployed or disposed. A lost/stolen laptop procedure is also in place to ensure data is not stolen.

Policies and procedures

Retain documentation for 6 years from the date of its creation, or the date when it was last in effect

Our Policies are being updated as part of SOC2 compliance, will be made available when complete.

Our Privacy Policy can be found here.

Transmission Security

Security measures to ensure that ePHI is not improperly modified

All stored email data (inbound/outbound) is encrypted at rest.

All external (public) network transfer are made using SSL for a secure transfer (first hop only).

Any/all support data provided that is downloaded by support staff is stored only only full disk encrypted company hardware.

Mechanisms to encrypt ePHI whenever it is deemed appropriate

JEMHC interactions with your mailbox can only be made using SSL protocol (only first hop transport security guarantee)

JEMHC interactions with your Jira can only made using SSL protocol.

User interactions with JEMHC app can only be made using SSL protocol.

User interactions with our support system can only be made using SSL protocol.

JEMHC (user) and JEMHC (system) IM notifications are only made using SSL protocol.

How to use JEMHC/support to minimize HIPAA Impact

Being HIPAA certified has challenges for us as an Email processor /sender, we need PHI (Email Addresses) for core functionality. We don’t specifically ‘know’ what data you store, so can’t specifically ‘redact’. We are not HIPAA compliant at this point. The following would be seen as the ‘technical measures’ our app has that could be applied for HIPAA compliance.

The JSM notification templates we use include a limited subset of fields that notifications include, so overall JEMHC measures in place that support HIPAA could be viewed as:

  • We limit what field we send in notifications (not all changed fields would be sent), you can add more fields specifically.

  • You can enable/disable inline images and attachments to be sent (at all)

  • You can enable/disable email-user support (that stores email addresses in custom fields where no portal user / Jira user is desired), Email Addresses are PHI, are a HIPAA data category, for HIPAA compliance, you’d probably have to not use this feature

  • You can enable/disable attachment of the raw Email to the issue, again for HIPAA compliance you’d probably have to not use this feature.

  • If an inbound mail is not processed, a ‘fwd’ mail is sent to the Profile > Forward Users, linking to the Audit record involved. If you have disabled auditing the full mail is attached to avoid data loss. The full mail obviously contains IP addresses, recipient addresses, full content etc.

  • If you flag a mail for support in auditing, an issue is created in our support system referring the audit record. Only such flagged mails (its processing Report, your Profile) are available to all our support staff via a back-office app, through which data downloads can occur, such data is burned when support tickets are closed out.

Edge Cases

  • Webhook containing data about issue events (that drive JEMHC notifications) are kept for a short time, but still are available to System administrators, can be ‘saved’ as Preview Contexts for Template Set previews.

  • Auditing retains copies of Inbound and Outbound mail for 30days, this is available to System administrators. You can opt-out of auditing but make it hard for you to diagnose processing problems, and will prevent you from performing simple recovery actions (e.g. Jira user not allowed to comment) and will impact our ability to help with problems you may encounter.

Support

For HIPAA compliance, for support purposes, you would need to ensure we don’t get PHI data. It means the onus is on you to re-create emails to demonstrate problems. The impact of the following will be that our ability to deliver great support will be hindered, a cost of HIPAA compliance.

  • NOT send us an email containing PHI

  • NOT attach an email containing PHI to a support case

  • NOT use the “Flag for support” feature at all, to prevent any all PHI data from being exposed to use in support.

  • NOT send/attach the REPORT from processing a real email, as this may contain PHI.

Further Reading

Business Associate Agreement

BAA’s require legal oversight, we do not have one at this time.

Further Information

If you need more, feel free to log a support ticket with us: