Encrypted Email Services - Advanced Modern Solutions

Encrypted Email Solution
Encrypted Email Services
Version 2.1
General Level Instructions
HIPAA Compliant Solution for Secured Communications via Email
2012-2013
Page 1 of 13
Encrypted Email Solution
Table of Contents
1.
Introduction
1.1 Description
1.2 Sample
1.3 Integration
2.
Decrypting Files
2.1 Download App
2.2 Register App
2.3 Open Encrypted File
3.
Encrypting Files
3.1 Registering with Us
3.2 Encrypting Files
3.3 Send Email
4.
GUI (screens) for Sending Emails
4.1 Login
4.2 Address Book
4.3 Sending Emails
4.4 Sent Emails
4.5 User Management
Page 2 of 13
Encrypted Email Solution
1. Introduction
1.1
Description
The use of traditional email is not considered a HIPAA-compliant communication method because the
transmission of a typical email message and any attachments on it is done in an unencrypted form.
Currently there is only one solution to this dilemma: the use of secured email services. Such services
are HIPAA compliant; however, they present an entirely different set of issues for healthcare
organizations:
Secured email services require the email recipient to open a browser window, type a user ID
and password. Only then can the user view the inbox. This is far from an ideal solution,
especially for smart phone users, as the process is inconvenient and cumbersome.
When the user sees the inbox of the secured email service on a smart phone, the email’s
subject and text of its body is significantly smaller in size compared with that of the phone’s
native email application. Since the text is barely readable, the user will usually resize the
browser window but then spend even more time by having to constantly scroll.
Secured email services are a significant burden on a hospital’s IT department:
1) A new set of servers must be established.
2) Greater maintenance and vigilance of user email accounts become necessary.
3) New associated procedures must be created and followed.
Finally, doctors, nurses and other healthcare professionals consensually desire a single point of
entry in mobile phone usage, as opposed to the navigation of a multi-stepped protocol.
1.2
Sample
Our solution resolves above issues. Here is an example of how it does that:
1. Let’s say that a hospital sends an email to a Dr. John Smith ([email protected]) and it contains
the following text: “Dear Dr. Smith, this is a reminder that you have a surgery tomorrow at 9AM. Patient is
Sarah Brown, MRN# 12345. Her recent x-ray and transcribed follow-up visit are attached.” In addition, assume
that the hospital user then attaches the following files:
a. xray_12345.bmp (Bitmap)
b. followup_12345.doc (Microsoft Word document)
2. At this point, the email and attachments are instantly encrypted and automatically converted to
the following formats:
a.
b.
c.
Message.HCEF
Attachment1.HCEF
Attachment2.HCEF
Page 3 of 13
Encrypted Email Solution
3. Users of hospital computers can then send these 3 files to [email protected] through its regular
email communication method. It is now 100% HIPAA compliant because the aforementioned
files are now all encrypted within the email (rather than being re-routed to a different server).
4. Dr. Smith uses his native email application on a mobile device to receive that above email from
the hospital. He taps the first file (Message.HCEF), and our App seamlessly decrypts the text of a
message in the background, and displays the text on the mobile device screen. He taps the
second file, and again, our App quickly decrypts the first attachment, and shows file
“xray_12345.bmp” within his native mobile phone application (capable of opening a BMP file).
The same goes for the second attachment.
1.3
Integration
Our Encrypted Email Solution is also an ideal medium to broadcast automatic messages such as:
1. Patient lists
2. Appointment schedules
3. Emergency notifications
Integration of this technology into a hospital’s computer system will not present any difficulty for the
IT department of that hospital. We provide the department with the SDK (Software Development
Toolkit) which contains samples and instructions for Linux and Windows systems. We also provide any
necessary support on an ongoing basis.
In the event the IT department does not want to incorporate our encryption SDK into their program, or
if it is just simpler and more convenient to bypass the IT department, you can allow your personnel to
use a platform developed by us that is totally secure. If this is the case you can go to section 4 for an
explanation as to how this works.
Depending on the type of computer system of the hospital and the preferences of its IT department,
our Encrypted Email Solution, once fully integrated into the system, will then be displayed as a new
menu item on the featured Internet browser or appear as a new button on the application. It can also
operate fully hidden and not appear at all.
For example, if a hospital administrator using Microsoft Outlook can hide the appearance of the
solution by altering the functionality of the “Send” button. At that point, the hospital clerk works as
usual, as all components and attachments of any emails to be sent are now automatically encrypted
instantly (while running in the background) prior to the sendout of that email.
Page 4 of 13
Encrypted Email Solution
2. Decrypting Files
These instructions assume that the hospital (that sends you emails) is affiliated with our organization
and uses our Encrypted Email solution for file encryption.
2.1.
Download App
We have developed 3 programs for the following devices:
a) App for iPhones (iPods, iPads, etc)
b) App for Android cell phones
c) App for Windows based laptops and computers (yes, Outlook is supported too)
All of the above programs are free and can be found in the respective stores (iTunes or Google), or
they can be downloaded directly from our web site at
www.AdvancedModernSolutions.com/enc_test.php.
It is certainly not a problem if you have more than one device. You can install the App on any number
of devices and on any combination of them.
2.2.
App Registration
You need to register the App only once, though multiple registrations do not result in any damages,
even from the same device.
You will not be able to register the App unless there is at least one email sent to you from a hospital
affiliated with our organization and uses our Encrypted Email solution for file encryption.
Registration is required in order for the App to record your email address and telephone number. The
App will decrypt ONLY files intended to be sent to the registered email address. This means that if you
forward your email (that contains HCEF encrypted files) to another email address, the recipient of that
email will be unable to open HCEF files unless he/she registered the same App with the same email
address.
The reason to enter your telephone number is that we are currently working on adopting this
technology to SMS (in addition to email). Once that takes place, you will not need to re-register your
App or even change anything on your device.
Page 5 of 13
Encrypted Email Solution
The registration process is very simple and consists of a single screen. To register, tap the icon of the
App and the following appears:
a) Enter your phone, then email address, then a 4-digit numeric password.
b) Click the “Register” button
That is all! At this time the App notifies you that you are successfully registered. You can close the App
and you will most likely never see it again. All tasks conducted by the App after this point will run in the
background, invisible to the user.
Note. Please make sure that the password you pick is easy to remember. The password is designed to
protect you. If another person (who accidentally received your email) has obtained our App and is
trying to register it, then he/she will need to enter your phone number/email address and your
password in order to successfully register. This is much harder compared to entering only a phone
number and email address. In addition, our servers count the number of unsuccessful attempts to
register, and block that particular user after a certain number of attempts takes place.
2.3.
Opening an Encrypted File
This is the easiest step. Check your email the way you have always done. Do you see any HCEF file(s)
attached to it?
a) Windows users: double click the file
b) Android users: tap the file
c) i-OS users: tap our icon located to the left of the file name, then select “Open in Decrypto”
Page 6 of 13
Encrypted Email Solution
3. Encrypting Files
These instructions assume that you are an IT person in the hospital that is affiliated with our
organization.
3.1.
Registering with Us
Sign up with our solution and we will set you up with the system within 15 minutes. As part of the
registration process, you will receive the following credentials:
a) URL that contains the API for file encryption
b) User ID and password for your organization
You will also receive a sample PHP script (similar to above) that you can use to encrypt files.
Encryption of the single file takes a single trip to our server via HTTPS POST method. To be HIPAA
compliant, such a trip should be made using security sockets (SSL), so that all uploaded and
downloaded data is encrypted as it travels to/from our servers.
3.2
Encrypting Files
Each email message consists of the email subject, email body and zero or more attachments. If any of
that data contains patient-related healthcare information, then it must be encrypted. Each component
of the email message will be converted into the HCEF file. Bear in mind that the file name cannot
contain PHI as well, and should always end with “.HCEF”. Finally, make sure that the file does not
Page 7 of 13
Encrypted Email Solution
contain more than one dot; otherwise, some devices may not recognize it as an HCEF file. Here are
some examples:
Good File Name
Message.HCEF
Patient_X-Ray.HCEF
Followup_visit.HCEF
Email_Subject.HCEF
3.3
Bad File Name
Message.Body.HCEF
Patient_X-Ray.HCF
Followup_John_Smith.HCEF
Email_Subject-ATTN!!!.HCEF
Reason
Double Dot
Invalid Extension
Do Not Include Patient Name
Invalid Character (!)
Sending Emails
Now you are ready to send emails using any tools you have already been using and those you are most
comfortable with. Remember - encryption keys are based on the email address of the receiver – so if
you need to send the same message to more than one doctor, you need to encrypt that same message
individually for each doctor.
Page 8 of 13
Encrypted Email Solution
4. GUI (screens) for Sending Emails
The IT department of the hospital may decide against the incorporation of our encryption SDK into
their programs. Instead, they could allow their personnel to use a platform developed by us. This
platform automatically encrypts emails before sending them out through regular email channels. The
entire platform is protected by a security certificate (256-bit encryption-key).
4.1
Login
This URL is always used for login:
https://AdvancedModernSolutions.com/hcef_login.php
Enter User ID and Password provided to you by your organization’s administrator
Click button Login
Page 9 of 13
Encrypted Email Solution
4.2
Address Book
Every user of our platform has an address book that is not sharable with other platform users. Click
the red button Address Book to manage this feature.
To add a new contact:
Click button Add New Contact
Enter the name, email and any associated note, then click red button Save Contact
To edit contact:
Click button Edit left of the contact name
Edit name, email and/or note, then click red button Save Contact
Page 10 of 13
Encrypted Email Solution
4.3
Sending Emails
To send an encrypted email, click the red button Compose Mail:
Enter a recipient’s email address or select them from your address book:
o Click button Show Address Book
o Click button Add to Recipients, right of the contact name
o Click button Hide Address Book
Type the email subject and email body
Browse for attachments, then click button Upload. To remove an uploaded attachment:
o Click X left of the attached file
Click button Send Mail
Page 11 of 13
Encrypted Email Solution
4.4
Sent Emails
Please note that we do NOT keep your emails on our servers. This feature makes our platform not only
unique but advantageous in many ways. One advantage is the absence of any worry you might have
that our servers will be “broken into” by hackers and your valuable information will be compromised;
there is simply not any information on the server to compromise. Another advantage is that all of
your outgoing emails are still sent from your regular email address, which negates any need to go to
another source (us) to find information. However, we still write a log of your activities and the
following screen illustrates the extent of the information we actually do keep:
Recipient’s email address
Date the email was sent
Encryption options that were used when the email was sent
Number of attached files
Page 12 of 13
Encrypted Email Solution
4.4
User Management
The user management section is for the administrator(s) of your organization. The administrator(s)
uses the same login screen, and upon login, is presented with the User Management screen that allows
him/her to created accounts for personnel that will be using our solution to send encrypted emails.
Page 13 of 13