Javascript is required for MOREAL Online Documentation to function properly. Please enable Javascript by adjusting your browser settings.

HIPAA Compliance Reporting

HIPAA (Health Insurance Portability and Accountability Act) compliant organizations can now print reports that respect selected compliance standards.

Sample HIPAA Compliance Reporting screen

The HIPAA Security Rule applies to all health plans, healthcare clearinghouses and to any healthcare provider who transmits protected health information (PHI) in electronic form, or electronic protected health information (ePHI). According to the U.S. Department of Health and Human Services, those that fall under this category are known and referred to as Covered Entities (CE).

HIPAA requires that all the before-mentioned Covered Entities dealing with sensitive patient data must establish a security management process to protect patients’ confidential data from attempted unauthorized access, use, disclosure, or interference. MOREAL collects and analyzes log data across organization networks and creates daily, weekly and monthly reports, which are divided in 3 sections: System Activity, Data Access Reports and Security Incident Tracking.


The supported Rules & Regulations of the HIPAA Standard are the following:

  • ยง164.308 Administrative safeguards(a)(1)(ii)(D): Information system activity review.
    Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports.

    Related graphs:
    – Top Detected Threats
    – Top Users By Bandwidth
    – Top Blocked Threats

  • (a)(5)(ii)(B): Protection from malicious software.
    Procedures for guarding against, detecting, and reporting malicious software.Related graphs:
    – Top Blocked Apps
  • (a)(5)(ii)(C): Log-in monitoring.
    Procedures for monitoring log-in attempts and reporting discrepancies.Related graphs:
    – Sessions
    – Failed Login Attempts
  • (a)(5)(ii)(D): Password management.
    Procedures for creating, changing, and safeguarding passwords.Related graphs:
    – Failed Login Attempts