SOC It to Me
When the FHIR
Starts to Burn
Encrypt It Like
It’s Hot
HIPAA or Hype?
The Regulatory
Rumble
100

This framework focuses on five Trust Service Criteria—security, availability, processing integrity, confidentiality, and privacy—to ensure that service organizations manage customer data safely.

What is SOC 2?

100

In healthcare tech, the acronym FHIR is used for sharing electronic health data. What does FHIR stand for?

What is Fast Healthcare Interoperability Resources?

100

This process scrambles patient data so that it cannot be read without a special key or password.

What is encryption?

100

This type of patient information, often abbreviated as PHI, includes names, addresses, and medical records that HIPAA protects

What is Protected Health Information?

100

This U.S. law protects the privacy and security of patients’ medical information and is often abbreviated as HIPAA.

What is the Health Insurance Portability and Accountability Act?

200

Name any two of the five Trust Service Criteria used to evaluate SOC 2 compliance.

What are Security, Availability, Processing Integrity, Confidentiality, or Privacy?

200

This modern healthcare data standard, unlike its predecessor HL7 v2, uses an API-first design rather than batch-oriented messaging—making it more flexible, scalable, and better suited for cloud-based architectures.

What is FHIR (Fast Healthcare Interoperability Resources)?

200

Because HITRUST aligns with NIST and emphasizes automated security monitoring, cloud platforms must implement this authentication method for all PHI access.

What is Multi-Factor Authentication (MFA)?

200

Enacted in 1996, HIPAA was designed to protect patient health information and improve the efficiency of the healthcare system through standardization. What does the acronym HIPAA stand for?

What is the Health Insurance Portability and Accountability Act?


200

This widely adopted framework combines HIPAA, NIST, ISO, and other standards into a single certifiable security and privacy program commonly used by healthcare organizations.

What is HITRUST CSF (Common Security Framework)?

300

This Trust Service Criterion ensures that healthcare systems remain operational and accessible when needed.

What is availability? 

300

Under TEFCA, these designated entities are responsible for facilitating data exchange across networks, acting as the backbone for a trusted nationwide interoperability framework.

What are QHINs (Qualified Health Information Networks)?

300

This advanced technology is increasingly being used in healthcare to detect cyber threats, monitor unusual network activity, and protect patient data, all in real time—reducing breaches and ensuring HIPAA compliance.

What is Artificial Intelligence (AI)?

300

Under the updated HIPAA rules, covered entities must now notify affected individuals of a data breach within this number of calendar days, down from the previous 60.

What is 30 days?

300

Launched by the ONC, this initiative aims to create a nationwide health data exchange framework by connecting Qualified Health Information Networks (QHINs).

What is TEFCA (Trusted Exchange Framework and Common Agreement)?

400

As organizations face rising expectations for continuous security and transparency, there’s growing demand for this type of always-updated assurance report aligned with Trust Services Criteria.

What is real-time SOC 2 reporting?

400

This industry-standard authorization framework enables secure, token-based access to healthcare APIs, ensuring that only authorized users and applications can retrieve protected health data.

What is OAuth 2.0?

400

This Trust Services Criterion within SOC 2 focuses on ensuring that data is complete, valid, accurate, timely, and authorized, and is often the most challenging for healthcare organizations to demonstrate.

What is Processing Integrity?

400

Under the HIPAA Privacy Rule, this principle limits the use and disclosure of Protected Health Information (PHI) to only what’s needed for specific job duties—and requires Cloudticity customers to enforce role-based access, encryption, and access logging.

What is the Minimum Necessary Rule?

400

This 2016 law promotes interoperability and prohibits information blocking, giving patients more control over their electronic health information.

What is the 21st Century Cures Act?

500

This type of SOC 2 report provides a detailed audit of a company’s controls over a defined period, offering deeper assurance to healthcare clients about operational effectiveness.

What is a SOC 2 Type II report?

500

This specification extends OAuth 2.0 by standardizing authentication and authorization workflows in healthcare, enabling secure, app-based access to electronic health records through FHIR APIs.

What is SMART on FHIR (Substitutable Medical Applications, Reusable Technologies)?

500

This access control model limits who can view or edit PHI by assigning permissions based on job responsibilities—and enforces the principle of “least privilege."

What is Role-Based Access Control (RBAC)?

500

The new HIPAA rule updates increase penalties for delayed or insufficient breach reporting. The maximum fine per violation can now reach up to this amount.

What is $1.5 million?

500

In response to rising cybersecurity threats, HITRUST updated this foundational component to better align with NIST, ISO, and emerging risks.

What is the HITRUST CSF (Common Security Framework)?

M
e
n
u