You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/HIPAA_REQUIREMENTS.md
+22-7Lines changed: 22 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,13 @@
1
1
2
-
# HIPAA_REQUIREMENTS.md
2
+
# HIPAA Requirements
3
3
4
-
This document describes what is required to operate Faxbot in a HIPAA‑aligned manner. It is a technical guide and checklist for engineers and operators. It is not legal advice. Always consult your compliance team and counsel. You (the operator) are responsible for implementing and documenting the controls below and for executing a formal risk analysis and governance program.
4
+
!!! warning "Not legal advice"
5
+
This page is a technical guide and checklist for engineers and operators.
6
+
Always consult your compliance team and counsel. You (the operator) are responsible for implementing and documenting controls and for a formal risk analysis.
1) Transport security (164.312(e) Transmission Security)
30
44
- Public API must be served over HTTPS. Use TLS certs from a reputable CA.
31
45
- For Phaxio backend:
32
46
-`PUBLIC_API_URL` must be HTTPS in production.
33
47
- Enable callback signature verification (default on): `PHAXIO_VERIFY_SIGNATURE=true`. Server verifies `X-Phaxio-Signature` (HMAC‑SHA256 over raw body with `PHAXIO_API_SECRET`).
34
48
- For SIP backend:
35
49
- SIP signaling should use TLS if supported by your provider; media (T.38 over UDPTL) is typically not encrypted. Mitigate with a site‑to‑site VPN/private interconnect to your SIP provider and strict firewalling.
36
50
- Never expose AMI (5038/tcp) to the public internet.
51
+
- Mapping: HIPAA Transmission Security (integrity and encryption) → use TLS/VPN for signaling/transport; T.38 media typically requires network isolation or VPN.
37
52
38
-
2) Access control
53
+
2) Access control (164.312(a)(1))
39
54
- Require API key on all /fax and /fax/{id} calls (`X-API-Key`). Do not run with blank `API_KEY` in production.
40
55
- Restrict inbound traffic with a reverse proxy: IP allowlists and rate limiting.
41
56
- Rotate credentials and set a strong AMI password. Do not use `changeme`.
42
57
43
-
3) Data minimization & confidentiality
58
+
3) Data minimization & confidentiality (164.306(a); 164.312(c)(1))
44
59
- Do not log PHI. Ensure request bodies (PDF/TXT) and rendered content are never logged.
45
60
- Faxbot redacts tokenized PDF URLs from logs.
46
61
- Tokenized PDF access:
@@ -52,11 +67,11 @@ Implement the following as minimum controls:
52
67
- Separate storage for development vs production. Limit admin access and use MFA on hosts.
53
68
- Data retention policy: delete PDFs/TIFFs after transmission completes and your minimum retention requirement is satisfied.
0 commit comments