
Central data vault
Store ePHI in folders that are encrypted by separate set of keys, effectively protecting them even if administrative accounts are compromised as a result of digital or physical theft.

Secure syncing
Choose between different methods to keep encrypted folders synchronized across local and remote systems. Avoid decrypting folders during data transfer.

Endpoint protection
Safeguard endpoints by backing them up to encrypted destinations with Active Backup for Business, or opt for secure and convenient cloud backup secured by end-to-end encryption with C2 Backup.

Storage infrastructure protection
Protect the central ePHI repository by backing it up to a variety of destinations, including Synology C2 Storage. Maintain confidentiality by encrypting data even before it leaves the source.
The Health Insurance Portability and Accountability Act (HIPAA) was introduced by US Congress in 1996 to set regulatory standards for the lawful use and disclosure of electronic protected health information (ePHI). Under HIPAA regulations, healthcare providers and businesses are expected to meet a set of requirements aimed at ensuring the privacy and security of any ePHI that is created, managed, received, or transmitted.
What are the HIPAA rules?
HIPAA legislation consists of five rules. Each rule lays out different requirements for HIPAA compliance:
Are Synology systems HIPAA certified?
- Privacy Rule: How, when, and under what circumstances ePHI can be used and disclosed
- Security Rule: Technical, physical, and administrative standards to safeguard the integrity of ePHI
- Omnibus Rule: Integration of HITECH’s provisions into HIPAA to strengthen protection of ePHI
- Breach Notification Rule: Terms and conditions for the notification of data breaches involving ePHI to interested parties and the public
- Enforcement Rule: Investigation and penalties applied following a data breach involving ePHI
The US Department of Health and Human Services (HHS) does not officially issue or recognize any form of HIPAA compliance certification. Complying with the requirements set forth by the HIPAA regulations is thus the sole responsibility of covered entities and business associates, which must ensure that the systems and services they use are configured to protect the integrity and confidentiality of all the ePHI they store or process.