The Need for Advanced Mobile Device Management and Full Disk Encryption in Healthcare. A MainNerve Whitepaper

Size: px
Start display at page:

Download "The Need for Advanced Mobile Device Management and Full Disk Encryption in Healthcare. A MainNerve Whitepaper"

Transcription

1 The Need for Advanced Mobile Device Management and Full Disk Encryption in Healthcare A MainNerve Whitepaper

2 Overview The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA and HITECH regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well as more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records. In addition, the latest information technology from smartphones and tablets, easily portable laptops, CDs, and USB "flash" drives (also called memory sticks) to , the internet, and shared networks while streamlining work for healthcare practitioners and administrators, and helping with the free flow of information so vital to quality patient care, is also opening new avenues of risk for security breaches. At the global level, a maze of differing regulations and varying levels of IT infrastructure across countries create additional challenges for data security and patient privacy as well as in cross-border transactions. Fortunately there are solid and proven technologies that any healthcare organization can implement to secure their data, helping them comply with HIPAA/HITECH and dealing with the other security issues they face. Paramount among these are Mobile Device Management and Disk Encryption. Mobile Device Management (MDM): BYOD at work. The benefits are tremendous and proven. So are the risks. MDM extends controls to employees' devices so that they remain productive and secure: turn on built-in encryption, remotely wipe data, and impart powerful security measures like mobile antivirus and more. Fortunately there are solid and proven technologies that any healthcare organization can implement to secure their data, helping them comply with HIPAA/HITECH and dealing with the other security issues they face. Disk Encryption: Very simply put, encryption is a way of "scrambling" the information on a disk so that only authorized users can "unscramble" it. Even if an encrypted computer or drive were stolen, the information on it would not be accessible, appearing merely as "gibberish". You can encrypt the data on a file, a particular drive (for example, a portable memory stick), or the full disk (called Full Disk Encryption). Most importantly, Disk Encryption is generally considered to meet HIPAA and HITECH requirements for data protection. Simple enough for a local doctor's office to implement, yet robust 2

3 enough to meet the demands of a major healthcare center, Mobile Device Management and Disk Encryption, taken together, form the basis of a solid security framework that addresses many of the most pressing concerns in healthcare today. The Unique Security Challenges in Healthcare Complying with HIPAA Since the passage of the Health Insurance Portability and Accountability Act (HIPAA) in intended to deal systematically with the privacy of patients' medical and personal information - healthcare organizations from local physician's offices to world-class hospitals have been making major changes, both administratively and technologically, to ensure compliance. In addition to HIPAA's major focus on the privacy of all patient information, the Administration Simplification (AS) provisions in Title II of HIPAA go even further with regard to electronic data, establishing national standards for the exchange of electronic data that seek to increase efficiency and accuracy as well as to ensure the security and privacy of the electronic data. Both the privacy regulations and the security rules have substantial compliance ramifications for providers. But the HIPAA regulations, while explaining overall requirements and recommendations, do not detail exactly how a healthcare organization should comply. That leaves each healthcare organization to devise an approach and implement those technological solutions that it feels will most effectively help it comply fully with HIPAA's privacy and electronic data security requirements. And because fines for violating HIPAA regulations can be stringent - and the intangible costs of negative public relations, especially for hospitals, medical centers and insurers can be staggering - complying with HIPAA is a major concern for healthcare organizations of any size. Although the deadlines for HIPAA compliance have past, many organizations from small practices to major health centers are still planning their compliance strategies. Consider the following handful of actual cases involving lost or stolen computers, laptops, drives and memory sticks: In an ironic twist, computers with 60,000 patient records were stolen from the San Jose Medical Group - just weeks before the deadline for HIPAA compliance. 1 In an embarrassing incident in 2008, the National Institute of Health (NIH) reported the theft of a laptop with 3

4 confidential records of 3,000 patients including those of Representative Joe Barton of Texas, a founder of the Congressional Privacy Caucus with congressional responsibility for the NIH. 2 In the first six months of 2008 alone, there have been reported incidents of stolen laptops, computers and drives with unencrypted data affecting thousands of patients, among them Health Net (5,000 records), Fallon Community Health Plan (30,000 records), Memorial Hospital of South Bend Indiana (4,300 records), Lifeblood (321,000 records), Blue Cross and Blue Shield of Western New York (40,000 records), National Institute of Health (4,359 records), Presbyterian Intercommunity Hospital of Whittier California (5,000 records), and HealthSpring, Inc. (9,000 records). 3 If Full Disk Encryption or even Drive Encryption or proper Password Protection had been in place on the stolen equipment, the ramifications of these incidents would have been drastically reduced. Demanding as it is, complying with HIPAA and HITECH is not the only challenge the healthcare sector faces when meeting its data privacy and security needs. HITECH: Data Breach Notification Rule The HITECH Act, passed in 2009, promotes the adoption and meaningful use of health information technology, and addresses privacy and security concerns by strengthening the civil and criminal enforcement of HIPAA. It includes but is not limited to 4 : An increase of penalties to a maximum of $1.5 million. Imposition of penalties even if a covered entity was unaware of a data breach. The introduction of the Breach Notification Rule. The Breach Notification Rule is especially viewed by many HIPAA experts as the chief element that impels encryption and other data security practices in healthcare settings. The current implementation of the notification rule requires covered entities to report any data breaches involving 500 or more patients to the Department of Health and Human Services (HHS) within 60 calendar days of their discovery. Once received, the HHS is enjoined to publicize the breach on its website. Furthermore, people whose PHI was affected must be notified or risk fines and other penalties. Health information protected by encryption, however, is given safe harbor from the rule, ensuring that these lamentable but oft-occurring incidents do not negatively impact organizations. 4

5 Other Unique Challenges for Data Security and Privacy in Healthcare Demanding as it is, complying with HIPAA and HITECH is not the only challenge the healthcare sector faces when meeting its data privacy and security needs. Other challenges include: Need for Secure Data Sharing: To achieve effective and prompt care, as well as streamline costs and administrative efforts, organizations and practitioners routinely share a patient's health record. In fact, the US Department of Health and Human Services estimates that approximately 150 different persons handle a patient's medical record during a single hospitalization. 5 Already approximately 20% to 25% of hospitals are up and running with electronic records systems, as are nearly 15% to 20% of doctors' offices 6. And that number will probably skyrocket when Congress passes the Health IT Bill, which encourages and sets standards for electronic data sharing. Obviously patient data that is shared so widely and routinely needs a high level of protection that also enables safe sharing such as Drive Encryption, which can protect portable memory sticks, and Password Protection, which can be used to secure files that need to be sent by or over the internet. Tempting Target for Identity Theft: Medical records have also proven to be an especially tempting target for simple identity theft. Many patient records include name, date of birth, and Social Security Number (often as part of an insurance ID) along with other details that provide all the information that identity thieves seek, conveniently located in one place. Theft of health records for any purpose is still considered a major HIPAA breach. Full Disk Encryption and/or Drive Encryption not only help meet HIPAA compliance but protect against identity theft as well. Portable Technology - Opportunity as well as Risk: Increasingly practitioners and organizations - like most businesses in many sectors - are relying on small and portable technology such as smartphones, tablets, laptops, and USB "flash" drives (also called memory sticks) to make their work easier and more effective. Easy to carry between the office, hospital and home, or on the road to an important seminar or conference, the same features that make these devices so useful to the busy healthcare practitioner or administrator make them prone to loss and theft and, if not protected properly, to HIPAA Easy to carry between the office, hospital and home, or on the road to an important seminar or conference, the same features that make these devices so useful to the busy healthcare practitioner or administrator make them prone to loss and theft. 5

6 breaches and identity theft. Across all industries, a large percentage of security breaches are directly related to lost or stolen smartdevices, laptops, and USB drives. Once again, it is clear that Drive Encryption is a must for portable computers and storage devices in the healthcare environment. Insurance Identity Theft: Occasionally medical records are mined for insurance identities, which are then stolen and sold so that uninsured individuals in need of serious medical attention can gain access to the healthcare system. The "patient" could ostensibly receive medical care based on the medical information in the stolen records, rather than on the actual medical condition and the result could be a matter of life and death. By preventing access to the information, password protection and drive encryption close this potentially lifethreatening gap as well. Lost, Stolen, or Adulterated Records and Malpractice: Physicians and hospitals must not only protect their patients, they must occasionally also protect themselves in unfortunate cases of malpractice. Lost, stolen or adulterated records (records that can be shown to be changed or compromised in some way during the course of a patient's treatment, even if the records were not lost or stolen) pose a serious malpractice threat. In addition, electronic records which are not disposed of properly (for example, a memory stick which is simply thrown away or erased and reused) can open the door to a security breach. With the costs of malpractice insurance rising, and the risk of enormous awards quite real, protecting electronic data from adulteration is a necessity for every practitioner and organization. Proper encryption and password protection secures your records against adulteration as well as loss or theft. Different nations and regions currently have differing levels of regulations, differing cultures concerning regulation and privacy, and differing levels of development in the underlying healthcare and information technology infrastructure. The Global Scene: A Maze of Differing Situations and Regulations As challenging as data privacy and security compliance requirements in the healthcare arena seem in the US, in other parts of the world, the situation can seen even more daunting. Different nations and regions currently have differing levels of regulations, differing cultures concerning regulation and privacy, and differing levels of development in the underlying healthcare and information technology infrastructure. The following examples provide a glimpse into this global maze. 6

7 European Union: Despite the existence of major regulations concerning privacy of healthcare record in the European Union (EU), such as the EU Directive on Data Protection 95/46/EC and the EU Directive on Personal Data in Electronic Communications 02/58/EX, each country in the EU has its own implementation of the basic principles of the EU regulations. Data protection regulation in the EU is general, rather than targeted to a specific industry; each member country and industry is responsible for providing "adequate" data protection. Recent EU legislation has been focusing on the need for more stable IT infrastructure as well as improved patient data safety. United Kingdom: Data security and privacy issues in the UK, governed by the Data Protection Act, are undergoing serious re-evaluation, having recently been shaken by several large and serious security breaches. The National Health Service (NHS) at Dumfries and Galloway reported two lost USB flash drives that were not properly encrypted. Other locations reported 67, 32, 24, 21 and 15 cases respectively. An unofficial survey of doctors at a leading London hospital, reported in the Health Services Journal, revealed that 75% of the doctors carried unsecured USB flash drives with confidential data. 7 The loss of personal confidential data has ignited such public outrage in the UK that various patients' groups have launched a campaign to tighten security at the NHS. Many, though not all, of the breaches, involved electronic data that was not sufficiently protected or encrypted. 8 The Pacific Rim: The countries of the Pacific Rim provide a kaleidoscopic snapshot of challenge and opportunity with regard to healthcare and electronic data privacy. In 2005 Japan tightened protection on the handling of personal data which, although not mentioning health records directly, has had a direct impact on electronic data in the healthcare sector. In Australia, which has one of the more advanced security scenarios of the Pacific Rim nations, the large-scale trial of a new system in 2006 using electronic health records (called Health elink) raised serious concerns about the overall privacy issues and risks that are still being debated. And in Singapore, a massive government effort is underway to transform the healthcare delivery system using IT as its base. With its first initiative of implementing electronic medical records well underway, the Singaporian system is now turning serious attention to establishing IT standards and a legislative framework for data protection. 7

8 Cross-Border Healthcare Transactions: In addition to the challenges faced within the various countries, healthcare records increasingly "cross borders" not only with patients traveling out of their own country for care, but with test samples routinely sent across borders for evaluation and results returned to the countries of origin. Complex "Safe Harbor" agreements, that create basic standards for adequate data protection, exist to help facilitate the necessary transactions, but the burden still rests with the healthcare organization to meet the adequate data protection standards for their own country and any countries they are dealing with. The MainNerve Solution: Mobile Device Management and Full Disk Encryption MainNerve, a leader in web-based secure mobile device management and disk encryption service for enterprises of any size that want highly-scalable, cost-effective, but easy-to-deploy encryption and security software, has solutions for your unique data protection needs. With Mobile Device Management, Disk Encryption, and Password Protection working together, you can comply with HIPAA and HITECH as well as protect your organization from the other very real risks faced in today's healthcare environment. MainNerve's Password Protection MainNerve uses a Password Protection technology called "preboot authentication" sometimes also called "power-on authentication." This means a user must enter their username and password the very moment their computer or laptop is turned on before Windows (or any other operating system on the computer) is even loaded. If the wrong password is entered, the computer locks up and cannot be used. Authentication that takes place after the computer has started and Windows or the other operating system has loaded is vulnerable to hacking. This is because a hacker could use the operating system itself to get around the password protection. Pre-boot authentication is safer because it operates at a lower level than the operating system itself hackers can no longer bypass the operating system to gain access to the computer. 8

9 By providing protection at the pre-boot level, pre-boot authentication serves as the foundation of Disk Encryption - without the password, you cannot access the computer at all. MainNerve's Disk Encryption Solutions MainNerve provides Disk Encryption of the highest order, industry-leading encryption with the pre-boot authentication for laptops described above. Furthermore, BYOD devices like smartphones and tablets can also be secured via its easy-to-use mobile device management (MDM) suite. Disk Encryption Software MainNerve's Disk Encryption Software enables Full Disk Encryption that is, software you can use to encrypt an entire drive, using 256 bit encryption. For example, you could encrypt the hard drive on a computer, on a CD or a memory stick. This type of Full Disk Encryption offers some unique benefits that might not be immediately apparent. Once Full Disk Encryption is in place, the drive cannot be "slaved" into another PC. Slaving a drive is a way of adding the drive as a secondary or subordinate drive on a separate computer and thereby gaining access to the information on the slave drive. With Full Disk Encryption in place it becomes impossible to use the encrypted drive as a slave drive. Full Disk Encryption is so powerful that it is considered the method of choice to "erase" information on an unused or outdated drive. Because the encrypted information is inaccessible, it is safer to encrypt the undesired drive than to try to destroy or dispose of it. With Full Disk Encryption, your data is effectively protected against theft even if your laptop or computer is stolen, only the hardware is lost. The health records and personal patient data on the stolen device are safe and secure and you and your organization are protected from the cost and headaches of dealing with a major security breach. MainNerve's cloud-based solution enables finance companies to deploy, secure, and manage over one million devices from a central console within minutes. "Device agnostic" support for better frontline efficiency and protection from platform over-dependency, keeping information safe and secure. Mobile Device Management, Encryption, and Security Often termed BYOD, consumerization of IT, or CYOD (Choose Your Own Device), healthcare organizations are increasingly adopting mobile devices like smartphones and tablets to create dynamic, mobile workforces. These devices promise and deliver real productivity gains that healthcare organizations cannot afford 9

10 to ignore. Yet, incursions into the mobile workplace have shown that security concerns are very real. Regaining control and enabling PHI security, then, is of paramount importance; however, it requires facing challenges that are not a healthcare organization's core competency. There are logistical, technological, and even budgetary challenges that are foreign to those making the foray into a secure mobile workspace. Gaining the required experience is, for most companies, beyond the scope of their objectives and considered an improper use of resources. Regaining control and leveraging the mobile computing trend need not be an insurmountable challenge, however. MainNerve empowers healthcare IT with control over Apple, Android, BlackBerry, and Windows devices without crippling the bottom line or making security compromises. MainNerve's cloud-based solution enables healthcare organizations to deploy, secure, and manage over one million devices from a central console within minutes. "Device agnostic" support for better frontline efficiency and protection from platform over-dependency, keeping information safe and secure for patients and hospitals or doctors alike. IT can also expect the easiest to use, most powerful management console on the market today that delivers a complete security and compliance overview because MainNerve provides visibility as to who has sensitive data and the ability to lock down that data, at any given moment, when it may be compromised or lost. Conclusion Mobile Device Management and Disk Encryption, such as those offered by MainNerve, enable healthcare organizations to meet HIPAA and HITECH requirements as well as confront other risks faced in today's IT environment, at the same time encouraging the free flow of patient information, improving patient care and reducing costs while protecting patient privacy and ensuring data security.

11 References 1 "Computers with Patient Data Stolen on Eve of HIPAA Compliance Rules," Information Week, April 13, "NIH Security Breach Includes Data on US Rep," FierceHealth IT Weekly New for Health IT Leaders, April 7, 2008; "At risk of exposure: In the push for electronic medical records, concern is growing about how well privacy can be safeguarded," Los Angeles Times, June 26, 2006; 6 Bill Seeks National Medical Records System, Los Angeles Times, August 13, 2006; 7 "Medics put patient data at risk," BBC News, September 4, 2008 and "Doctors memory sticks threaten data security," Health Service Journal, September 4, "NHS hit by new data losses," Scotland on Sunday, August 24, 2008.

Top Five Ways to Protect Your Network. A MainNerve Whitepaper

Top Five Ways to Protect Your Network. A MainNerve Whitepaper A MainNerve Whitepaper Overview The data security challenges within the business world have never been as challenging as they are today. Not only must organizations providers comply with stringent State

More information

The Case for Email Encryption

The Case for Email Encryption The Case for Email Encryption Improve Compliance and Protect PHI on the Move Healthcare organizations face an ongoing compliance burden involving the protection of sensitive patient data. The task of safeguarding

More information

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION

More information

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Mobile Device Management Risky Business in Healthcare North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Agenda HIPAA/HITECH & Mobile Devices Breaches Federal

More information

7 VITAL FACTS ABOUT HEALTHCARE BREACHES. www.eset.com

7 VITAL FACTS ABOUT HEALTHCARE BREACHES. www.eset.com 7 VITAL FACTS ABOUT HEALTHCARE BREACHES www.eset.com 7 vital facts about healthcare breaches Essential information for protecting your business and your patients Large breaches of Personal Health Information

More information

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC Why Does Privacy and Security Matter? Trust Who Must Comply with HIPAA Rules? Covered Entities (CE)

More information

The Salmon Group Mobile Device Management & Security Total Cost of Ownership Advantage

The Salmon Group Mobile Device Management & Security Total Cost of Ownership Advantage The Salmon Group Mobile Device Management & Security Total Cost of Ownership Advantage Abstract Enterprise and government are ceding ground to security threats as mobile technologies penetrate the traditional

More information

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches

More information

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology 20140115 Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology TABLE OF CONTENTS What s at risk for your organization? 2 Is your business

More information

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind Page1 Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind The use of electronic medical records (EMRs) to maintain patient information is encouraged today and

More information

BYOD: Bring Your Own Policy. Bring Your Own Device (BYOD) is already making a significant impact on the way the private sector works.

BYOD: Bring Your Own Policy. Bring Your Own Device (BYOD) is already making a significant impact on the way the private sector works. BYOD: Bring Your Own Policy Bring Your Own Device (BYOD) is already making a significant impact on the way the private sector works. BYOD: Bring Your Own Policy Bring Your Own Device (BYOD) is already

More information

Overview of the HIPAA Security Rule

Overview of the HIPAA Security Rule Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this

More information

Getting Hip to the HIPAA and HITECH Act Compliance

Getting Hip to the HIPAA and HITECH Act Compliance Getting Hip to the HIPAA and HITECH Act Compliance NaNotchka M. Chumley, D.O., M.P.H. Family Medicine Physician Los Angeles, CA Integrating Global Trade & Logistic and Cybersecurity Westin St. Francis,

More information

3/13/2015 HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA?

3/13/2015 HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA? HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA? 1 DEFINITIONS HIPAA Health Insurance Portability and Accountability Act of 1996 Primarily designed

More information

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm Electronic Health Records: Data Security and Integrity of e-phi Worcester, MA Wednesday, 2:15pm 3:30pm Agenda Introduction Learning Objectives Overview of HIPAA HIPAA: Privacy and Security HIPAA: The Security

More information

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones

More information

Solutions Brief. PC Encryption Regulatory Compliance. Meeting Statutes for Personal Information Privacy. Gerald Hopkins Cam Roberson

Solutions Brief. PC Encryption Regulatory Compliance. Meeting Statutes for Personal Information Privacy. Gerald Hopkins Cam Roberson Solutions Brief PC Encryption Regulatory Compliance Meeting Statutes for Personal Information Privacy Gerald Hopkins Cam Roberson March, 2013 Personal Information at Risk Legislating the threat Since the

More information

IRONKEY CASE STUDIES. Healthcare Solutions

IRONKEY CASE STUDIES. Healthcare Solutions IRONKEY CASE STUDIES Healthcare Solutions HEALTHCARE Business Problem Healthcare providers, insurers and pharmaceutical companies, have a lengthening list of regulations and standards on protecting confidential

More information

Reporting of HIPAA Privacy/Security Breaches. The Breach Notification Rule

Reporting of HIPAA Privacy/Security Breaches. The Breach Notification Rule Reporting of HIPAA Privacy/Security Breaches The Breach Notification Rule Objectives What is the HITECH Act? An overview-what is Protected Health Information (PHI) and can I protect patient s PHI? What

More information

Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com

Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com Choose Your Own Device (CYOD) and Mobile Device Management gsolutionz.com Choose Your Own Device (CYOD) and Mobile Device Management 2 gsolutionz.com People are starting to expect the ability to connect

More information

HIPAA, PHI and Email. How to Ensure your Email and Other ephi are HIPAA Compliant. www.fusemail.com

HIPAA, PHI and Email. How to Ensure your Email and Other ephi are HIPAA Compliant. www.fusemail.com How to Ensure your Email and Other ephi are HIPAA Compliant How to Ensure Your Email and Other ephi Are HIPAA Compliant Do you know if the patient appointments your staff makes by email are compliant with

More information

A 5-STEP PLAN TO PREPARE FOR HEALTHCARE. A Complimentary White Paper from

A 5-STEP PLAN TO PREPARE FOR HEALTHCARE. A Complimentary White Paper from A 5-STEP PLAN TO PREPARE FOR BYOD IN HEALTHCARE A Complimentary White Paper from A 5-step plan to prepare for BYOD in health care A Complimentary White Paper from Healthcare Business & Technology Nearly

More information

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks

More information

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Presenting a live 90-minute webinar with interactive Q&A Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Developing a Comprehensive Usage Strategy to Safeguard Health Information and

More information

Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com

Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks

More information

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services How MSPs can profit from selling HIPAA security services Managed Service Providers (MSP) can use the Health Insurance Portability

More information

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style. Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style March 27, 2013 www.mcguirewoods.com Introductions Holly Carnell McGuireWoods LLP

More information

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant 1 HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant Introduction U.S. healthcare laws intended to protect patient information (Protected Health Information or PHI) and the myriad

More information

HIPPA Goes HITECH. Data Protection for Agents

HIPPA Goes HITECH. Data Protection for Agents HIPPA Goes HITECH Data Protection for Agents For agent information only. this material should not be distributed to the public or used in any solicitation. 13-0127 Course objectives Agents will be able

More information

Bring Your Own Device (BYOD) and Mobile Device Management

Bring Your Own Device (BYOD) and Mobile Device Management Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect

More information

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect

More information

The Impact of HIPAA and HITECH

The Impact of HIPAA and HITECH The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients

More information

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule HIPAA More Important Than You Realize J. Ira Bedenbaugh Consulting Shareholder February 20, 2015 This material was used by Elliott Davis Decosimo during an oral presentation; it is not a complete record

More information

Proofpoint HIPAA Breach Report:

Proofpoint HIPAA Breach Report: Proofpoint HIPAA Breach Report: An Analysis of HITECH Breach Notifications and Settlements, Q1 2013 Healthcare Industry Update threat protection compliance archiving & governance secure communication Contents

More information

Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud

Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud 1 Contents The Obligation to Protect Patient Data in the Cloud................................................... Complying with the HIPAA

More information

ISEC Seminar : Protecting Personal Data in the Electronic Media Personal Data Security @ JPMorgan Micky Lo March 2007 1 Agenda Data Theft Incidence & Industry Figures Threats and Vulnerabilities Data Protection

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

What do you need to know?

What do you need to know? What do you need to know? DISCLAIMER Please note that the information provided is to inform our clients and friends of recent HIPAA and HITECH act developments. It is not intended, nor should it be used,

More information

HIPAA Email Compliance & Privacy. What You Need to Know Now

HIPAA Email Compliance & Privacy. What You Need to Know Now HIPAA Email Compliance & Privacy What You Need to Know Now Introduction The Health Insurance Portability and Accountability Act of 1996 (HIPAA) places a number of requirements on the healthcare industry

More information

Healthcare Insurance Portability & Accountability Act (HIPAA)

Healthcare Insurance Portability & Accountability Act (HIPAA) O C T O B E R 2 0 1 3 Healthcare Insurance Portability & Accountability Act (HIPAA) Secure Messaging White Paper This white paper briefly details how HIPAA affects email security for healthcare organizations,

More information

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality HIPAA Audits: How to Be Prepared Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality An Important Reminder For audio, you must use your phone: Step 1: Call (866) 906-0123.

More information

HIPAA Compliance: Efficient Tools to Follow the Rules

HIPAA Compliance: Efficient Tools to Follow the Rules Bank of America Merrill Lynch White Paper HIPAA Compliance: Efficient Tools to Follow the Rules Executive summary Contents The stakes have never been higher for compliance with the Health Insurance Portability

More information

HIPAA Violations Incur Multi-Million Dollar Penalties

HIPAA Violations Incur Multi-Million Dollar Penalties HIPAA Violations Incur Multi-Million Dollar Penalties Whitepaper HIPAA Violations Incur Multi-Million Dollar Penalties Have you noticed how many expensive Health Insurance Portability and Accountability

More information

The Security Rule of The Health Insurance Portability and Accountability Act (HIPAA) Security Training

The Security Rule of The Health Insurance Portability and Accountability Act (HIPAA) Security Training The Security Rule of The Health Insurance Portability and Accountability Act (HIPAA) Security Training Introduction The HIPAA Security Rule specifically requires training of all members of the workforce.

More information

HIPAA Security Rule Compliance

HIPAA Security Rule Compliance HIPAA Security Rule Compliance Caryn Reiker MAXIS360 HIPAA Security Rule Compliance what is it and why you should be concerned about it Table of Contents About HIPAA... 2 Who Must Comply... 2 The HIPAA

More information

HIPAA: Bigger and More Annoying

HIPAA: Bigger and More Annoying HIPAA: Bigger and More Annoying Instructor: Laney Kay, JD Contact information: 4640 Hunting Hound Lane Marietta, GA 30062 (770) 312-6257 (770) 998-9204 (fax) laney@laneykay.com www.laneykay.com OFFICIAL

More information

HOW TO REALLY IMPLEMENT HIPAA. Presented by: Melissa Skaggs Provider Resources Group

HOW TO REALLY IMPLEMENT HIPAA. Presented by: Melissa Skaggs Provider Resources Group HOW TO REALLY IMPLEMENT HIPAA Presented by: Melissa Skaggs Provider Resources Group WHAT IS HIPAA The Health Insurance Portability and Accountability Act of 1996 (HIPAA; Pub.L. 104 191, 110 Stat. 1936,

More information

Business Communications for Healthcare

Business Communications for Healthcare Business Communications for Healthcare Today, many powerful business communication challenges face everyone in the healthcare chain including clinics, hospitals, insurance providers and any other organization

More information

Protecting Your Data On The Network, Cloud And Virtual Servers

Protecting Your Data On The Network, Cloud And Virtual Servers Protecting Your Data On The Network, Cloud And Virtual Servers How SafeGuard Encryption can secure your files everywhere The workplace is never static. Developments include the widespread use of public

More information

NEW PERSPECTIVES. Professional Fee Coding Audit: The Basics. Learn how to do these invaluable audits page 16

NEW PERSPECTIVES. Professional Fee Coding Audit: The Basics. Learn how to do these invaluable audits page 16 NEW PERSPECTIVES on Healthcare Risk Management, Control and Governance www.ahia.org Journal of the Association of Heathcare Internal Auditors Vol. 32, No. 3, Fall, 2013 Professional Fee Coding Audit: The

More information

How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization

How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization Alertsec offers Cloud Managed - Policy Controlled - Security Modules for Ensuring Compliance at the Endpoints Contents

More information

HIPAA Privacy, Security, Breach, and Meaningful Use. CHUG October 2012

HIPAA Privacy, Security, Breach, and Meaningful Use. CHUG October 2012 HIPAA Privacy, Security, Breach, and Meaningful Use Practice Requirements for 2012 CHUG October 2012 The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Standards for Privacy of Individually

More information

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 What is HIPAA? Health Insurance Portability & Accountability Act of 1996 Effective April 13, 2003 Federal Law HIPAA Purpose:

More information

HIPAA PRIVACY AND SECURITY AWARENESS. Covering Kids and Families of Indiana April 10, 2014

HIPAA PRIVACY AND SECURITY AWARENESS. Covering Kids and Families of Indiana April 10, 2014 HIPAA PRIVACY AND SECURITY AWARENESS Covering Kids and Families of Indiana April 10, 2014 GOALS AND OBJECTIVES The goal is to provide information to you to promote personal responsibility and behaviors

More information

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Table of Contents Understanding HIPAA Privacy and Security... 1 What

More information

HIPAA and Health Information Privacy and Security

HIPAA and Health Information Privacy and Security HIPAA and Health Information Privacy and Security Revised 7/2014 What Is HIPAA? H Health I Insurance P Portability & A Accountability A - Act HIPAA Privacy and Security Rules were passed to protect patient

More information

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013 Updates on HIPAA, Data, IT and Security Technology June 25, 2013 1 The material appearing in this presentation is for informational purposes only and should not be construed as advice of any kind, including,

More information

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer

ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING By: Jerry Jackson Compliance and Privacy Officer 1 1 Introduction Welcome to Privacy and Security Training course. This course will help you

More information

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Executive Summary Today s Healthcare industry is facing complex privacy and data security requirements. The movement

More information

Best Practices for DLP Implementation in Healthcare Organizations

Best Practices for DLP Implementation in Healthcare Organizations Best Practices for DLP Implementation in Healthcare Organizations Healthcare organizations should follow 4 key stages when deploying data loss prevention solutions: 1) Understand Regulations and Technology

More information

Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology

Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology Developing a Policy for Bring Your Own Device Report to the Joint Legislative Oversight Committee on Information Technology Chris Estes State Chief Information Officer Office of Information Technology

More information

HIPAA Security COMPLIANCE Checklist For Employers

HIPAA Security COMPLIANCE Checklist For Employers Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major

More information

Matthew Howes Senior Vice President, Strategic Services inventiv Digital+Innovation Matthew.Howes@inVentivHealth.com

Matthew Howes Senior Vice President, Strategic Services inventiv Digital+Innovation Matthew.Howes@inVentivHealth.com WHITE PAPER Global Digital Security: The Human Element March 2014 Written by: Matthew Howes Senior Vice President, Strategic Services inventiv Digital+Innovation Matthew.Howes@inVentivHealth.com TABLE

More information

Community First Health Plans Breach Notification for Unsecured PHI

Community First Health Plans Breach Notification for Unsecured PHI Community First Health Plans Breach Notification for Unsecured PHI The presentation is for informational purposes only. It is the responsibility of the Business Associate to ensure awareness and compliance

More information

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Linda Vincent, R.N., P.I., CITRMS Vincent & Associates Founder The Identity Advocate San Pedro, California The opinions expressed

More information

Workarounds in Healthcare, a Risky Trend. Produced by. media

Workarounds in Healthcare, a Risky Trend. Produced by. media Workarounds in Healthcare, a Risky Trend. Produced by media When healthcare workers bring their own laptop computers, tablets and smartphone devices to work, and use them to perform workarounds a way to

More information

Balancing Security and Speed: Developing Mobile Apps for Enterprise

Balancing Security and Speed: Developing Mobile Apps for Enterprise Balancing Security and Speed: Developing Mobile Apps for Enterprise Contents Executive Summary 3 The Realities of Developing Secure Enterprise Applications 3 How Data Leaves Mobile Devices 3 Partnering

More information

How To Manage A Mobile Device Management (Mdm) Solution

How To Manage A Mobile Device Management (Mdm) Solution Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help

HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help The Health Information Portability and Accountability Act (HIPAA) Omnibus Rule which will begin to be enforced September 23, 2013,

More information

COMPLIANCE ALERT 10-12

COMPLIANCE ALERT 10-12 HAWAII HEALTH SYSTEMS C O R P O R A T I O N "Touching Lives Every Day COMPLIANCE ALERT 10-12 HIPAA Expansion under the American Recovery and Reinvestment Act of 2009 The American Recovery and Reinvestment

More information

HIPAA Security Rule Changes and Impacts

HIPAA Security Rule Changes and Impacts HIPAA Security Rule Changes and Impacts Susan A. Miller, JD Tony Brooks, CISA, CRISC HIPAA in a HITECH WORLD American Health Lawyers Association March 22, 2013 Baltimore, MD Agenda I. Introduction II.

More information

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist HIPAA Omnibus Rule Overview Presented by: Crystal Stanton MicroMD Marketing Communication Specialist 1 HIPAA Omnibus Rule - Agenda History of the Omnibus Rule What is the HIPAA Omnibus Rule and its various

More information

Presented by: Leslie Bender, CIPP General Counsel/CPO The ROI Companies www.theroi.com

Presented by: Leslie Bender, CIPP General Counsel/CPO The ROI Companies www.theroi.com Healthcare Compliance: How HiTECH May Affect Relationships with Business Associates Presented by: Leslie Bender, CIPP General Counsel/CPO The ROI Companies www.theroi.com Legal Disclaimer This information

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning

More information

HIPAA Compliance Review Analysis and Summary of Results

HIPAA Compliance Review Analysis and Summary of Results HIPAA Compliance Review Analysis and Summary of Results Centers for Medicare & Medicaid Services (CMS) Office of E-Health Standards and Services (OESS) Reviews 2008 Table of Contents Introduction 1 Risk

More information

White Paper #6. Privacy and Security

White Paper #6. Privacy and Security The Complexity of America s Health Care Industry White Paper #6 Privacy and Security www.nextwavehealthadvisors.com 2015 Next Wave Health Advisors and Lynn Harold Vogel, Ph.D. The Complexity of America

More information

Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer

Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer The Data Breach Epidemic Continues.. 1 Data Encryption Choices for Businesses................... 2 The Hardware

More information

Healthcare to Go: Securing Mobile Healthcare Data

Healthcare to Go: Securing Mobile Healthcare Data Healthcare to Go: Securing Mobile Healthcare Data Lee Kim, Esq. SANS Mobile Device Security Summit 2013 May 30, 2013 Copyright 2013 Lee Kim 1 Why Information Security is Essential for Healthcare Safeguard

More information

Encryption Buyers Guide

Encryption Buyers Guide Encryption Buyers Guide Today your organization faces the dual challenges of keeping data safe without affecting user productivity. Encryption is one of the most effective ways to protect information from

More information

Hosting for Healthcare: ADDRESSING THE UNIQUE ISSUES OF HEALTH IT & ACHIEVING END-TO-END COMPLIANCE

Hosting for Healthcare: ADDRESSING THE UNIQUE ISSUES OF HEALTH IT & ACHIEVING END-TO-END COMPLIANCE Hosting for Healthcare: ADDRESSING THE UNIQUE ISSUES OF HEALTH IT & ACHIEVING END-TO-END COMPLIANCE [ Hosting for Healthcare: Addressing the Unique Issues of Health IT & Achieving End-to-End Compliance

More information

OCR/HHS HIPAA/HITECH Audit Preparation

OCR/HHS HIPAA/HITECH Audit Preparation OCR/HHS HIPAA/HITECH Audit Preparation 1 Who are we EHR 2.0 Mission: To assist healthcare organizations develop and implement practices to secure IT systems and comply with HIPAA/HITECH regulations. Education

More information

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations Enabling a HITECH & HIPAA Compliant Organization: Addressing Meaningful Use Mandates & Ensuring Audit Readiness Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard Compliance Mandates Increased

More information

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice Monday, August 3, 2015 1 How to ask a question during the webinar If you dialed in to this webinar on your phone

More information

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work. OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android

More information

The HIPAA Security Rule Primer A Guide For Mental Health Practitioners

The HIPAA Security Rule Primer A Guide For Mental Health Practitioners The HIPAA Security Rule Primer A Guide For Mental Health Practitioners Distributed by NASW Printer-friendly PDF 2006 APAPO 1 Contents Click on any title below to jump to that page. 1 What is HIPAA? 3 2

More information

What is HIPAA? The Health Insurance Portability and Accountability Act of 1996

What is HIPAA? The Health Insurance Portability and Accountability Act of 1996 What is HIPAA? The Health Insurance Portability and Accountability Act of 1996 BASIC QUESTIONS AND ANSWERS What Does HIPAA do? Creates national standards to protect individuals' medical records and other

More information

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

Securing Health Data in a BYOD World

Securing Health Data in a BYOD World BUSINESS WHITE PAPER Securing Health Data in a BYOD World Five strategies to minimize risk Securing Health Data in a BYOD World Table of Contents 2 Introduction 3 BYOD adoption drivers 4 BYOD security

More information

Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done?

Information Security and Privacy. WHAT is to be done? HOW is it to be done? WHY is it done? Information Security and Privacy WHAT is to be done? HOW is it to be done? WHY is it done? 1 WHAT is to be done? O Be in compliance of Federal/State Laws O Federal: O HIPAA O HITECH O State: O WIC 4514

More information

Achieving HIPAA and HITECH Compliance. with Enterprise Single Sign-On

Achieving HIPAA and HITECH Compliance. with Enterprise Single Sign-On Achieving HIPAA and HITECH Compliance with Enterprise Single Sign-On Achieving HIPAA and HITECH Compliance with Enterprise Single Sign-On 1 TABLE OF CONTENTS The Challenges of HIPAA and HITECH Compliance

More information

Security Compliance, Vendor Questions, a Word on Encryption

Security Compliance, Vendor Questions, a Word on Encryption Security Compliance, Vendor Questions, a Word on Encryption Alexis Parsons, RHIT, CPC, MA Director, Health Information Services Security/Privacy Officer Shasta Community Health Center aparsons@shastahealth.org

More information

SOOKASA WHITEPAPER HIPAA COMPLIANCE. www.sookasa.com

SOOKASA WHITEPAPER HIPAA COMPLIANCE. www.sookasa.com SOOKASA WHITEPAPER HIPAA COMPLIANCE www.sookasa.com Demystifying HIPAA Compliance in the Cloud Healthcare s challenges There s no shortage of signals that the healthcare industry is under pressure: To

More information

Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell

Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell Mobile Mobile Mobile Devices in the CU Environ Mobile Banking Risks and Reward Tom Schauer ü Since 1986 ü TrustCC Founded TrustCC in 2001 ü

More information

The benefits you need... from the name you know and trust

The benefits you need... from the name you know and trust The benefits you need... Privacy and Security Best at Practices the price you can afford... Guide from the name you know and trust The Independence Blue Cross (IBC) Privacy and Security Best Practices

More information

Security Is Everyone s Concern:

Security Is Everyone s Concern: Security Is Everyone s Concern: What a Practice Needs to Know About ephi Security Mert Gambito Hawaii HIE Compliance and Privacy Officer July 26, 2014 E Komo Mai! This session s presenter is Mert Gambito

More information

Why Lawyers? Why Now?

Why Lawyers? Why Now? TODAY S PRESENTERS Why Lawyers? Why Now? New HIPAA regulations go into effect September 23, 2013 Expands HIPAA safeguarding and breach liabilities for business associates (BAs) Lawyer is considered a business

More information

Healthcare Compliance Solutions

Healthcare Compliance Solutions Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and

More information

Part 14: USB Port Security 2015

Part 14: USB Port Security 2015 Part 14: USB Port Security This article is part of an information series provided by the American Institute of Healthcare Compliance in response to questions we receive related to Meaningful Use and CEHRT

More information