Cloud computing often involves a shared security model. The cloud service provider (CSP) may provide a virtual vault, but all of its security is meaningless if the customer uses a weak password. When a HIPAA covered entity or business associate, such as a healthcare provider or health plan, uses cloud computing services and seeks to comply with HIPAA's Security Rule, it is imperative that the covered entity or business associate understand the shared security model, including what requirements are applicable to the covered entity or business associate, what requirements the CSP addresses, and what security responsibilities both must address. Who is responsible for encryption of data at rest? Of data in motion? How does the covered entity or business associate need to address its use of cloud services in its information security risk analysis? This session will focus on how the HIPAA Security Rule and other security laws apply to a cloud computing shared security model.