Which of the following is a private network that is only accessed within a company university or organization?

The HIPAA Rules apply to covered entities and business associates.  

Individuals, organizations, and agencies that meet the definition of a covered entity under HIPAA must comply with the Rules' requirements to protect the privacy and security of health information and must provide individuals with certain rights with respect to their health information. If a covered entity engages a business associate to help it carry out its health care activities and functions, the covered entity must have a written business associate contract or other arrangement with the business associate that establishes specifically what the business associate has been engaged to do and requires the business associate to comply with the Rules’ requirements to protect the privacy and security of protected health information. In addition to these contractual obligations, business associates are directly liable for compliance with certain provisions of the HIPAA Rules.

If an entity does not meet the definition of a covered entity or business associate, it does not have to comply with the HIPAA Rules. See definitions of “business associate” and “covered entity” at 45 CFR 160.103.

View an easy-to-use question and answer decision tool to find out if an organization or individual is a covered entity.

Fast Facts for Covered Entities

A Covered Entity is one of the following:

A Health Care ProviderA Health PlanA Health Care Clearinghouse

This includes providers such as:

  • Doctors
  • Clinics
  • Psychologists
  • Dentists
  • Chiropractors
  • Nursing Homes
  • Pharmacies

...but only if they transmit any information in an electronic form in connection with a transaction for which HHS has adopted a standard.

This includes:

  • Health insurance companies
  • HMOs
  • Company health plans
  • Government programs that pay for health care, such as Medicare, Medicaid, and the military and veterans health care programs
This includes entities that process nonstandard health information they receive from another entity into a standard (i.e., standard electronic format or data content), or vice versa.

Learn more about business associates

Learn more about business associate contracts

Content created by Office for Civil Rights (OCR)
Content last reviewed June 16, 2017

Current Staff, Faculty, and Students

If you are a current staff, faculty or student, please use the UTexas wifi network. For more information, please visit KB0010997.

Visitors to Campus

Visitors to campus have two options for Wi-Fi Internet access:

  1. utguest:  no account needed
  2. eduroam:  account at participating institution needed

How to use utguest

  1. From your Wi-Fi settings, select utguest from the list of available networks

That's it, no accounts, codes, coupons, or click-throughs needed.  utguest is an "open Wi-Fi network", meaning there is no encryption support or means of contacting you if there is a problem with the device.  Learn more at https://utguest.org.

Limited support for connecting your devices is available from the ITS Service Desk (512-475-9400, ).  Note the restrictions below.

How to use eduroam

Refer to instructions from your home institution-- they may be manual or utilize installer software.  In general:

  1. From your Wi-Fi settings, select eduroam from the list of available networks
  2. Your device will prompt for username and password. Typically of the form: j
  3. You may be asked to accept/trust the eduroam certificate
  4. For UT Austin persons traveling to other institutions, instructions are in https://network.utexas.edu/eduroam.

Contact your home institution for support connecting your device.  Note the restrictions below.

Restrictions

  • All usage is subject to the university's Acceptable Usage Policy and is monitored by the Information Security Office.  Devices may be quarantined for any reason.
  • Device must support one of: 802.11a/g/n/ac
  • The utguest network enables basic Internet access.  Visitors may use Virtual Private Networks for network services beyond web and VPN.  Allowed traffic includes:
Service Protocols/Ports Allowed
 Web

TCP 80, 443, 8080, 8443

UDP 443

 VPN

PPRP - IP 47; TCP 1723

L2TP - IP 50, 51; UDP 500, 1701, 4500, 10000

OpenVPN - TCP/UDP 443 & 1194

ZeroTier - UDP 9993

Mail

IMAP - TCP 143, 220, 993

POP - TCP 110, 995

SMTP - TCP 465

Lotus - TCP 1352

  • The eduroam network enables basic Internet access and few other ports.  Visitors may use Virtual Private Networks for network services beyond web and VPN.  Allowed traffic includes:
Service Protocols/Ports Allowed
 Web

TCP 80, 443, 3128, 8080, 8443

UDP 443

 VPN /

Tunnel

PPRP - IP 47; TCP 1723

L2TP - IP 50, 51; UDP 500, 1701, 4500, 10000

IPv6 Tunnel - IP 41

OpenVPN - TCP/UDP 443 & 1194

ZeroTier - UDP 9993

Mail

IMAP - TCP 143, 220, 993

POP - TCP 110, 995

SMTP - TCP 465, 587

Lotus - TCP 1352

SSH

TCP - 22

FTP

TCP - 21

Other

TCP - 16286 and 16287

  • This public wiki page compares VPN offerings.  Note, TCP based VPN services may be required due to use of carrier grade Network Address Translation (NAT/PAT).  For example, many OpenVPN derivatives will offer TCP as a transport option which should be chosen over UDP.
  • Bandwidth rate limits are in place to maintain adequate service levels for all users.
    utguest 25Mbps
    eduroam 75Mbps
    utexas no limit, prioritized
  • The university does not restrict content on these networks.
  • These networks are not part of the university's network, and may lack access to university resources.
  • In accordance with state law and UT System rules, UT Austin students, faculty, and staff may not use utguest. University services have been blocked or limited from utguest and eduroam, and are monitored by the Information Security Office to ensure compliance.  Devices may need utguest deleted from their profiles (KB0017851), and eduroam lowered in preference to the utexas Wi-Fi network to function well.

Sponsoring Visitors, Guests, and Affiliated Workers

Departments can sponsor access for visitors using a few different mechanisms. ITS does not create or sponsor guest accounts for department visitors.

Sponsoring Affiliated Workers

Longer term visitors who require regular access to the network (e.g., visiting researchers on campus for a semester, or long term contractors) will need an Affiliated Worker account to access the utexas Wi-Fi network.

Visitors in this role will need to create a UT EID if they do not already have one. Once the EID has been created, administrative staff from the sponsoring department will need to assign the correct affiliations and entitlements in the EID system. For more information on affiliate workers please see the Introduction to University Affiliate Positions page; see the Public Network Access notes in the Privileges section for details.

Sponsoring Guests on utexas

In limited circumstances a department TSC may sponsor a guest ID to use on the utexas Wi-Fi network. The sponsoring department incurs liability for the guest's activity while on the utexas network and is solely responsible for end-user support for the guest's devices. Guest IDs created in this manner only function on the utexas Wi-Fi and will not grant access to any other services requiring a UT EID.

Departments should consult with their Technical Support Contact (TSC) to seek sponsorship assistance.

Permalink: /utss/KAhome.do?number=KB0011686

Is a private network that is only accessed within a company university or organization?

An intranet is a private network contained within an enterprise that is used to securely share company information and computing resources among employees. An intranet can also be used for working in groups and teleconferences. Intranets encourage communication within an organization.

Which of the following is a private network that allows two or more firms to use the Internet to do business together?

An extranet is a private network that enterprises use to provide trusted third parties -- such as suppliers, vendors, partners, customers and other businesses -- secure, controlled access to business information or operations.