Skip to content

Commit f9a1f4b

Browse files
author
Faxbot Agent
committed
docs(HIPAA): add authoritative HHS/NIST links, prominent disclaimer, CTAs; map safeguards to CFR sections; keep content
1 parent 36b5490 commit f9a1f4b

File tree

1 file changed

+22
-7
lines changed

1 file changed

+22
-7
lines changed

docs/HIPAA_REQUIREMENTS.md

Lines changed: 22 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,13 @@
11

2-
# HIPAA_REQUIREMENTS.md
2+
# HIPAA Requirements
33

4-
This document describes what is required to operate Faxbot in a HIPAA‑aligned manner. It is a technical guide and checklist for engineers and operators. It is not legal advice. Always consult your compliance team and counsel. You (the operator) are responsible for implementing and documenting the controls below and for executing a formal risk analysis and governance program.
4+
!!! warning "Not legal advice"
5+
This page is a technical guide and checklist for engineers and operators.
6+
Always consult your compliance team and counsel. You (the operator) are responsible for implementing and documenting controls and for a formal risk analysis.
7+
8+
[:material-shield-lock: Security](security/index.md){ .md-button }
9+
[:material-lan: Network & Transports](security/network.md){ .md-button }
10+
[:material-key: Authentication](security/authentication.md){ .md-button }
511

612
## Scope & Data Flows
713
- Covered workflows: sending faxes that may contain PHI.
@@ -24,23 +30,32 @@ PHI touchpoints:
2430
- Self‑hosted SIP stack does not remove HIPAA obligations; it moves them to you.
2531

2632
## Technical Safeguards (Security Rule)
33+
34+
!!! info "Authoritative sources"
35+
- HHS HIPAA Security Rule (overview): https://www.hhs.gov/hipaa/for-professionals/security/index.html
36+
- Technical safeguards (45 CFR §164.312): https://www.ecfr.gov/current/title-45/subtitle-A/subchapter-C/part-164/subpart-C/section-164.312
37+
- General rules (45 CFR §164.306): https://www.ecfr.gov/current/title-45/subtitle-A/subchapter-C/part-164/subpart-C/section-164.306
38+
- Business Associate contracts (sample provisions): https://www.hhs.gov/hipaa/for-professionals/covered-entities/sample-business-associate-agreement-provisions/index.html
39+
- Cloud computing guidance (OCR): https://www.hhs.gov/hipaa/for-professionals/special-topics/cloud-computing/index.html
40+
- TLS configuration guidance (NIST SP 800‑52r2): https://csrc.nist.gov/pubs/sp/800/52/r2/final
2741
Implement the following as minimum controls:
2842

29-
1) Transport security
43+
1) Transport security (164.312(e) Transmission Security)
3044
- Public API must be served over HTTPS. Use TLS certs from a reputable CA.
3145
- For Phaxio backend:
3246
- `PUBLIC_API_URL` must be HTTPS in production.
3347
- Enable callback signature verification (default on): `PHAXIO_VERIFY_SIGNATURE=true`. Server verifies `X-Phaxio-Signature` (HMAC‑SHA256 over raw body with `PHAXIO_API_SECRET`).
3448
- For SIP backend:
3549
- SIP signaling should use TLS if supported by your provider; media (T.38 over UDPTL) is typically not encrypted. Mitigate with a site‑to‑site VPN/private interconnect to your SIP provider and strict firewalling.
3650
- Never expose AMI (5038/tcp) to the public internet.
51+
- Mapping: HIPAA Transmission Security (integrity and encryption) → use TLS/VPN for signaling/transport; T.38 media typically requires network isolation or VPN.
3752

38-
2) Access control
53+
2) Access control (164.312(a)(1))
3954
- Require API key on all /fax and /fax/{id} calls (`X-API-Key`). Do not run with blank `API_KEY` in production.
4055
- Restrict inbound traffic with a reverse proxy: IP allowlists and rate limiting.
4156
- Rotate credentials and set a strong AMI password. Do not use `changeme`.
4257

43-
3) Data minimization & confidentiality
58+
3) Data minimization & confidentiality (164.306(a); 164.312(c)(1))
4459
- Do not log PHI. Ensure request bodies (PDF/TXT) and rendered content are never logged.
4560
- Faxbot redacts tokenized PDF URLs from logs.
4661
- Tokenized PDF access:
@@ -52,11 +67,11 @@ Implement the following as minimum controls:
5267
- Separate storage for development vs production. Limit admin access and use MFA on hosts.
5368
- Data retention policy: delete PDFs/TIFFs after transmission completes and your minimum retention requirement is satisfied.
5469

55-
5) Integrity & auditing
70+
5) Integrity & auditing (164.312(c)(1), 164.312(b))
5671
- Maintain audit logs of access to `/fax/{job_id}/pdf`, job creation, and status changes. No PHI in logs; use job IDs and metadata only.
5772
- Time synchronize servers (NTP) for accurate audit trails.
5873

59-
6) Availability & recovery
74+
6) Availability & recovery (164.306(a))
6075
- Back up database (and optionally artifacts) on a secure, encrypted target with rotation.
6176
- Document restore procedures and test periodically.
6277

0 commit comments

Comments
 (0)