HIPAA for Tech Leaders

tabla jazz, garage tango, saxophone drum and bass · 3:59

Listen on 93

Lyrics

[Verse 1]
When data holds a patient's name and history
Social numbers, addresses, medication spree
Protected Health Information needs your care
PHI is everywhere, handle with prayer
Electronic records, X-rays on the screen
Mental health notes and genetic code unseen

[Chorus]
Business Associate Agreement signed in ink
BAA before you sync, BAA before you think
Encrypt at rest, encrypt in flight
Access controls burning bright
Audit trails and passwords strong
HIPAA compliance all day long

[Verse 2]
Covered entities like hospitals and clinics
Business associates help with their analytics
Cloud providers, billing firms, and tech consultants
Must have contracts, clear and constant
Workforce training, role-based access tight
Minimum necessary, keep permissions light

[Chorus]
Business Associate Agreement signed in ink
BAA before you sync, BAA before you think
Encrypt at rest, encrypt in flight
Access controls burning bright
Audit trails and passwords strong
HIPAA compliance all day long

[Bridge]
Sixty days to notify when breaches occur
Five hundred patients means the media's purr
HHS gets word, investigation starts
Fines can reach millions, breaking companies apart
Technical safeguards, administrative too
Physical security protects me and you

[Verse 3]
Firewalls and unique user identification
Automatic logoff prevents infiltration
Integrity controls stop unauthorized change
Transmission security across the data range
Risk assessments yearly, policies reviewed
Incident response when systems are skewed

[Chorus]
Business Associate Agreement signed in ink
BAA before you sync, BAA before you think
Encrypt at rest, encrypt in flight
Access controls burning bright
Audit trails and passwords strong
HIPAA compliance all day long

[Outro]
PHI protection is your sacred duty
BAA contracts keep the data beauty
Technical safeguards never sleep
Patient privacy yours to keep

← ISO 27001: Information Security Management | PCI DSS: Protecting Cardholder Data →