Skip to content

Building a Disaster Recovery Plan for HIPAA Compliance

If your business needs to follow the Health Insurance Portability and Accountability Act of 1996’s, or HIPAA’s, requirements, then you need to have a disaster recovery plan. Many small companies accidentally conflate the ideas of a business continuity plan and a disaster recovery plan. Keep the two separate and stay in compliance.

What is the difference between business continuity and disaster recovery?

Both of the two plans have similar circumstances and preparation work. They outline the procedures you have in place to keep backup data safe and ready to use in the event of an emergency, and they both have action steps for when they are triggered.

But they also serve different purposes: a business continuity plan outlines how to keep your company moving during an ongoing emergency while a disaster recovery plan outlines how your IT department will bring the backup data securely to the forefront. One is about keeping the network as undamaged as possible while the other is about repairing damaged data stores.

How can you build a robust disaster recovery plan?

Different companies use different strategies. Before you get stuck with too many options and not enough specifics online, follow these steps:

Ask your IT support company

While IT support companies can’t tell you what other businesses in your state and industry are doing, they know what every plan should include. Tap into their advice (and possible templates) so you know your plan is compliant and competitive with other plans.

Go to Health Resources & Services Administration directly

If you don’t know what your plan and cybersecurity requirements are, it’s harder to stay compliant. Even as you use other resources to pull a plan together, find what HIPAA has to say word-for-word.

If you want to get started building out your disaster recovery plan, contact us.

a person using a laptop computer on a wooden table

Cybersecurity in the Age of Remote Work

https://youtu.be/KV9kgmFj_sM Facing the challenges of remote work requires a proactive approach to cybersecurity measures to ensure the protection of sensitive

Phishing Attack

What to Do After a Phishing Attack

https://www.youtube.com/watch?v=wP42Et2mOGI If you’ve ever wondered what steps to take after falling victim to a phishing attack, rest assured that there

Let's Start a Conversation

Watch the video below and find out why you should fill out this form and start a conversation today.

"*" indicates required fields

Name*
This field is for validation purposes and should be left unchanged.