Checksums and hashes help ensure that HIPAA compliant forms are accurate and unaltered by indicating when changes are made to data during its transmission to different degrees of complexity.
A checksum is a simple value (generally a numerical sum) calculated from a data set to detect errors that have been introduced during its transmission or storage. It can be thought of as a mathematical fingerprint. If one aspect changes the checksum value also changes to represent the possibility of an error occurring along the way.
Hashes provides a similar but more complex function. Hashing takes input data (of any size) and produces fixed-size string of bytes (ie a fixed series of characters). This string of bytes is known as a hash and remains unique to the original input data. Like with checksums if the data changes at all, the hash changes. It makes hashes useful for securely checking data integrity.
A technical report from Stony Brook University provides, “Checksums that are generated using cryptographic hash functions prevent unauthorized users from generating custom checksums to match the malicious data modification that they have made.” What can be taken from this quote is that the combination of hashing in cryptography when creating checksums allows for improved security.
One example of how an ideal HIPAA compliant email form operates starts when a healthcare provider submits an electronic form. A checksum is generated for the data in the form. The checksum acts as a baseline to verify data integrity. Once the email reaches the patient the recipient's system recalculates the checksum. If the recalculated checksum matches the original, it confirms that the form has not been altered or corrupted during transmission.
Alongside the checksum, a hash value is created from the data, creating a unique digital fingerprint. The new hash is generated from the received data and compared with the original hash. If they match, it confirms that the data has not been tampered with during transit.
An organization that only handles transmission and not storage in any capacity.
An electronic form of a signature that validates the authenticity and integrity of digital documents.
A method of converting data into a coded format to prevent unauthorized access.