1 Securing Electronic Health Records (EHRs) to Achieve Meaningful Use Compliance, Prevent Data Theft and Fraud Featuring the results of the Privacy and Security Survey, March 2011
2 Since the passage of the HITECH Act, under the American Recovery and Reinvestment Act of 2009, efforts toward EHR adoption have increased significantly. Eighty-one percent of hospitals expressed their intent to qualify for payments under the Medicare and Medicaid EHR Incentive Programs, with about two-thirds expecting to enroll during the first stage of Meaningful Use (MU) in , according to the 2010 American Hospital Association s Annual Survey Database. A considerable amount of healthcare providers time and resources have been devoted to getting the basic EHR foundation in place. Meeting the objectives and measures for improving quality, safety, efficiency, care coordination, population and public health are getting the most attention within the core set of the Stage 1 MU criteria. While providing adequate privacy and security protections for personal health information is also a core set goal, healthcare providers seem to be only now realizing the need to establish a secure EHR system. As a result of the primary focus on getting EHRs operational, in many cases healthcare providers may have overlooked or ignored putting in place security and privacy protections. This was one of the key findings in a March 2011 Healthcare IT News survey, which was conducted on behalf of Oracle Corporation (Oracle) and Deloitte 1 to determine the knowledge and activity of hospitals and health systems around securing EHRs for achieving both MU compliance and preventing data theft and fraud. Nearly 300 individuals participated, with nearly a third holding the position of IT director or manager. The rest comprised CIOs or CTOs, administrative directors or managers, CMIOs, and privacy and security managers, among others. For the most part, healthcare providers have relied on vendors that support EHR technology to have the appropriate confidentiality, integrity and availability controls in place, said Danny Rojas, senior manager, Security & Privacy services, at Deloitte. In addition, security traditionally has been thought of as an enterprise-level service, separate from the EHR implementation, added Reid Oakes, senior director, Healthcare and Life Sciences Technology Solutions, at Oracle. The HITECH Act and the Patient Protection and Affordability Care Act (PPACA) of 2010 have added more rigor and regulatory pressure to establishing a trust framework for patient data that resides in the EHR, Rojas said. We re now seeing a convergence around the need for security as part of the EHR process, Oakes said. Development Stage for Secure EHRs 11% 38% 6% 7% 16% 16% 6% The EHR Incentive Program Final Rule requires healthcare providers to establish privacy and security protections for confidential information through operating policies, procedures, and technologies and compliance with applicable law, and deliver data-sharing transparency to patients. In addition, it calls for protecting electronic health information created or maintained by the certified EHR technology systems through the deployment of appropriate technical capabilities, which correspond to certification criteria for EHR technology. Secure EHRs comply with the Final Rule, but they also employ robust controls such as multi-level authentication and authorization, identity proofing, patient data access management and fraud detection to help healthcare providers significantly improve their privacy and security practices overall 1. Creating a business case - 7% Discovery/Development stage: Selecting technologies - 16% Deploying a solution - 16% Pilot/Proof of concept - 6% Enterprise-wide adoption of secure EHRs - 38% Limited secure EHR modules in production across specific clinical areas - 11% Other - 6% Striving for Compliance, Yet Critical Mass Lacking on Security For 80 percent of the Healthcare IT News survey respondents, meeting compliance was the highest expectation of achieving meaningful use of EHRs, followed by improved quality of care (71 percent), patient safety (67 percent) and cost savings (43 percent). Only 38 percent of respondents, however, reported that they are currently in the process of enterprise-wide adoption of secure EHRs. While this advanced activity is promising, the percentage of 1 As used in this document, Deloitte means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting.
3 respondents engaged in implementing a higher level of secure EHRs is low, especially given that qualification for Stage 1 incentive payments began this year. The remaining respondents reported that their organizations are in earlier stages of developing secure EHRs. Only 16 percent of respondents indicated that their organizations are deploying a solution for the development of a secure EHR. Another 16 percent are in the discovery/development stage and as such are in the midst of selecting technologies. Eleven percent have limited secure EHR modules in production across specific clinical areas. Seven percent are in the process of creating a business case, while 6 percent specified other, which included not having a plan at all. Awareness may be prevalent, but these data points suggest that healthcare providers need to act more swiftly. Securing EHRs meets multiple MU criteria, a fact that should spur action on the part of those who are far behind. Driving Adoption, Increasing Efficiency and Decreasing Costs Before clinicians can meaningfully use EHRs, they must overcome the traditional adoption barriers, including cost, lack of usability, productivity loss and workflow disruption. A cumbersome and manually driven privacy and security infrastructure can exacerbate those barriers. According to 59 percent of survey respondents, their healthcare organizations use their helpdesks to manually manage updating access when employees job roles change. Reliance on manual processes, which negatively impacts user experience and drives up IT costs, confirms what Oracle is seeing in the market, Oakes said. The key to the strategy is security should not get in the way of the clinical process, he said. Healthcare providers must not overcomplicate the clinicians environment and instead find easy ways to build, for example, comprehensive models for role assignments. Solving and automating identity creation and management processes, and solidifying those workflows upfront will deliver a seamless EHR experience for clinicians, which will make adoption more feasible and increase patient satisfaction as clinicians spend more time on patients rather than logging on or trying to access applications on their electronic devices, Oakes said. N onetheless, expect the number of healthcare organization participation in HIEs to increase significantly when the exchange of clinical data among separate entities takes on a greater role in stages 2 and 3 MU criteria. REID OAKES Senior Director, Healthcare and Life Sciences Technology Solutions Oracle Automating identity management processes will also save costs during implementation by avoiding increased resources required for manual creation of identities and certification of privileges and roles. If you don t take care of all the identity management and access controls, you can incur costs and increase volume to helpdesks, said Oakes. Lack of controls can give rise to password and single-sign on issues, such as poor password choices. Unless you lock down that part and automate it, you re really just going to shift the cost, he said. Controlling Risks Outside the Enterprise MU criteria require healthcare providers to offer their patients an electronic copy of their health information and be able to exchange key clinical information to improve care coordination. Both criteria involve sending patient data outside of a healthcare provider s
4 ealthcare H providers need to think at an enterprise level about what staff members are doing with the data and create a fraud-detection construct around how people get access to data. enterprise, which demands another level of rigorous privacy and security controls. Less than half of respondents reported that their organizations provide online access to patient records today. While 24 percent use multi-factor authentication to verify user identity or legitimacy of the transaction, 39 percent deploy username and password only to securely register patients for online access. More healthcare providers are granting online access to patient records, to be in compliance with MU. While more robust access controls, such as multi-factor authentication and adaptive access control to monitor user behavior, are not required overall, they are highly recommended especially if healthcare providers believe they are at a higher risk for privacy breaches and data theft. Patient Registration Tactics for Online Access 28.5% 38.7% More than a third of survey respondents share patient data with other organizations over a secure electronic network, and 23 percent use a health information exchange s (HIE) secure electronic network. Many HIEs and regional health information organizations (RHIOs) are still struggling with establishing sustainable business models and achieving critical mass of data-sharing partners whose contributions would create a broader, deeper and richer set of data. These usage numbers are encouraging, signaling HIE s value proposition to healthcare providers. The privacy and security risks and complexities increase, however, as the number of data-sharing partners grows within and outside of HIEs and RHIOs. 1.4% 24.3% 7.0% Username and password on y % Personal attributes [SSN#] - 7.0% Multi-factor authentication % Smart tokens - 1.4% Other % Nonetheless, expect the number of healthcare organization participation in HIEs to increase significantly when the exchange of clinical data among separate entities takes on a greater role in stages 2 and 3 MU criteria, Oakes said. As healthcare providers engage in HIE activity, they will need to deploy information rights management, which helps to ensure that once the data leaves the organization it is properly secured with the appropriate levels of security embedded to prevent data breaches and theft, as in the case of stolen electronic devices. In general security has to become more context aware and more granular to secure private data while allowing clinicians access to data that they need to be productive. Eliminating Privacy Breaches and Data Theft, Detecting Fraud Within the Enterprise Healthcare providers must also implement policies and controls to protect patient data within their four walls. The national media have reported on numerous privacy breaches in which hospital staff inappropriately accessed celebrities EHRs. A well-known Southern California medical center incurred multiple breaches involving the same pop singer in 2005 and More recently, three clinical support staff members at the Tucson University Medical Center were fired in January 2011 after allegedly accessing patient records of victims of the shooting tragedy in Arizona, which included U.S. Representative Gabrielle Giffords (D-AZ). Enabling the right people to see the right data at the right time within the healthcare organization requires robust access control policies and applications. According to the survey, nearly three-fourths of the respondents employ role-based control methods to
5 manage patient data access, followed by 13 percent whose organizations use mandatory access control. More than a third employ multi-factor authentication to perform identity proofing, followed by 27 percent whose organizations provide in-house background checking and 26 percent who deploy knowledge-based authentication. Implementing the right level of security provisioning, entitlement and other controls will ensure healthcare providers are protecting data within their organization. Access management has a major play in how we respond to meaningful use requirements, Oakes said. A security inside-out approach, which Oracle deploys, can help to secure and manage the data where it resides, as well as when it gets pushed out to and beyond the application level. Role-based security controls, internal policies and audit trails can help address privacy breach risks. Healthcare providers should also consider employing preventive and detective approaches to review user access, determine risk, and prevent excessive access to private data. Should a privacy breach occur, healthcare providers can rely on audit trails to identify who improperly accessed patient data and take immediate action dictated by internal policies. Proper policies and technical capabilities that enable a swift response can mitigate damage to and even enhance the healthcare provider s standing, which is critical in today s competitive market. While 62 percent of respondents use security information and event management (SIEM) and 13 percent deploy data leakage prevention tools to protect online patient data, a quarter of respondents have no fraud detection solution in place, which can increase vulnerability to fraud and the risk of noncompliance. Healthcare providers need to think at an enterprise level about what staff members are doing with the data and create a fraud-detection construct around how people get access to data, Oakes said. For example, clinicians as a group would be expected to have access to patient records. However, only clinicians assigned to a patient s care team should have access to that particular patient s record. Historically, identity and security have been managed at the enterprise level. With the adoption of EHRs, healthcare providers need to integrate privacy and security at the clinical application level, but still leverage some enterprise-class services. H ITRUST is really looking to provide common set of prescriptive security requirements that allow multiple healthcare players achieve a common goal relative to their own security posture and to meet HIPAA security rule compliance. MARK FORD Principal, Security & Privacy Services, Healthcare Services Deloitte & Touche LLP Meeting HIPAA and Certification Requirements The HITECH Act increased Heath Insurance Portability and Accountability Act s (HIPAA) data privacy and security requirements and expanded responsibility to business associates of covered entities. With HITECH there will be an increased focus on being able to conduct business in a trusted environment, said Mark Ford, principal, Security & Privacy services, Healthcare Services, at Deloitte & Touche LLP. Sixty-four percent of survey respondents indicated that they are addressing HIPAA and HITECH Act requirements, such as updating business associate agreements and updating privacy practices, to achieve meaningful use. That leaves more than a third not at that stage. For their first step, according to Ford, they should consider conducting a HIPAA security and privacy gap assessment against the updated rules to understand what needs to be fixed in order to be in compliance with the updated and expanded regulations.
6 As a reference point, any entity that handles ephi in the healthcare industry could review HITRUST s (Health Information Trust Alliance) Common Security Framework, a certifiable framework for organizations that create, access, store or exchange personal health information, which Deloitte utilizes as a requirements platform to perform Meaningful Use assessment. HITRUST is really looking to provide common set of prescriptive security requirements that allow multiple healthcare players achieve a common goal relative to their own security posture and to meet HIPAA security rule compliance, Ford said. Furthermore, HITRUST has built its own certification program where each entity can exchange their certifications credentials as opposed to having to conduct continuous security assessments of business associates a true test once and comply many type model. With 44 percent of respondents performing a security risk analysis of their certified EHR technology environment and 34 percent performing self-certification of their EHR technology for security and privacy requirements, healthcare providers are taking on greater responsibilities. Certification of the individual EHR can create additional complexity because it must provide security on multiple levels and also be aligned and integrated with the healthcare organization s overall HIPAA compliance, Ford said. Healthcare providers should avoid, for example, designing a certification control that contradicts efforts of the overall HIPAA compliance program. Bringing Depth and Breadth of IT and Services to Healthcare Providers Overwhelmed with ARRA and PPACA mandates, in conjunction with ICD-10 and 5010 conversions, many healthcare providers are seeking outside specialization to achieve compliance. Deloitte and Oracle are applying their core competencies and collaboration from their seventeen-year alliance to the healthcare industry s challenges. As a full-service professional services company, Deloitte augments its Security and Privacy practice by leveraging its various practices across its member firms, including audit and controls, systems integration, tax and financial advisory. We look at the problem from multiple angles and help clients throughout the lifecycle by understanding the systems and bringing in the specialists, deep technology and business process experience, said Ford. Specific to healthcare, Deloitte is a certified HITRUST assessor for meaningful use, and the company s industry-focused research center, the Deloitte Center for Health Solutions, delivers additional knowledge and understanding of the healthcare industry and trends through its research and policy tracking and monitoring. Employing a security inside-out approach, Oracle covers the entire breadth of security across the implementation and healthcare organization with its suite of comprehensive technologies. Healthcare providers can meet their specific needs with Oracle s modular, pre-integrated solutions, which comply with healthcare standards, complement other healthcare applications, are seamlessly incorporated within the clinician workflow and are flexible enough to meet future industry needs, Oakes said. By combining Deloitte s leading implementation practices and frameworks with Oracle s technologies and integration expertise, the two companies have the potential to deliver broad and deep solutions to the healthcare industry s most critical and pressing issues. Deloitte Statement This document contains general information only and Deloitte is not, by means of this document, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This document is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. In addition, this document contains the results of a survey conducted by a third party on behalf of Deloitte. The information obtained during the survey was taken as is and was not validated or confirmed by Deloitte. Deloitte, its affiliates, and related entities shall not be responsible for any loss sustained by any person who relies on this document. Copyright 2011 Deloitte Development LLC. All rights reserved. Member of Deloitte Touche Tohmatsu Limited About Oracle Oracle is the world s most complete, open, and integrated business software and hardware systems company. For more information about Oracle, please visit our Web site at Produced by MedTech Media Custom Group, All rights reserved. 71 Pineland Drive, Suite 203 New Gloucester, ME
Securing Microsoft s Cloud Infrastructure This paper introduces the reader to the Online Services Security and Compliance team, a part of the Global Foundation Services division who manages security for
Addressing HIPAA Security and Privacy Requirements in the Microsoft Cloud Authors Mohamed Ayad, Microsoft Corporation Hector Rodriguez, Microsoft Corporation John Squire, Microsoft Corporation Contributing
Security and Privacy for Healthcare Providers White Paper: Best Practices Series for Healthcare Contents Executive summary......................................................................................
Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System
Cyber risk in retail Protecting the retail business to secure tomorrow s growth Table of contents Foreword 3 Four issues come to the fore 4 Compliance does not always equal risk management 5 Breach response
Sustainability in business today: A cross-industry view Contents Foreword: Closing the gap between aspiration and action 3 About this study 6 Sustainability and the business 7 Sustainability and innovation
Business Associate Compliance With HIPAA: Findings From a Survey of Covered Entities and Business Associates Deven McGraw, Partner, Healthcare Industry, Manatt, Phelps & Phillips, LLP Susan Ingargiola,
January 14, 2013 Office of the National Coordinator for Health Information Technology Health IT Policy Committee Department of Health and Human Services Hubert H. Humphrey Building 200 Independence Avenue,
Information Technology Outsourcing GTAG Partners AICPA American Institute of Certified Public Accountants www.aicpa.org CIS Center for Internet Security www.cisecurity.org CMU/SEI Carnegie-Mellon University
Forward look Top regulatory trends for 2015 in securities Produced by the Center for Regulatory Strategies Foreword This publication is part of the Deloitte Center for Regulatory Strategies cross-industry
FEDERAL HEALTH IT STRATEGIC PLAN 2015 2020 Prepared by: The Office of the National Coordinator for Health Information Technology (ONC) Office of the Secretary, United States Department of Health and Human
Three guiding principles to improve data security and compliance Sarah Cucuz email@example.com IBM Software October 2012 Thought Leadership White Paper Three guiding principles to improve data security
C o m m i t t e e o f S p o n s o r i n g O r g a n i z a t i o n s o f t h e T r e a d w a y C o m m i s s i o n G o v e r n a n c e a n d I n t e r n a l C o n t r o l C O S O I N T H E C Y B E R A G
Network Security & Privacy Risks in the Health Care Industry May 2012 Aon Broking - Professional Risk Solutions 2012 Aon plc Brief Description: Conditions are ripe for health care organizations to fall
The Definitive Guide To tm Identity Management Archie Reed Introduction Introduction By Sean Daily, Series Editor The book you are about to enjoy represents an entirely new modality of publishing and a
A Forrester Consulting Thought Leadership Paper Commissioned By Dell How Electronic Health Records Are Driving New Storage Challenges For Hospitals January 2010 Table Of Contents Executive Summary... 2
Healthcare Informatics June 2012 Accountable Care Organizations Early Lessons learned from strong revenue cycle performers Healthcare Informatics Accountable Care Organizations Early Lessons learned from
What is EHR Interoperability and Why Should I Care? A reference document for Urgent Care and Occupational Health Providers Mary P. Stroupe, May, 2011 Executive Summary Many providers mistakenly think that
Ensuring Privacy and Security of Health Information Exchange in Pennsylvania 2014 Contents Introduction...3 Executive Summary...4 Key Definitions..5 Concepts, Stakeholders... 5 Personal Health Information..
NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs) Matthew Scholl Kevin Stine Kenneth Lin Daniel Steinberg NISTIR 7497 Security Architecture Design Process for Health
IBM Global Services October 2005 Beyond disaster recovery: becoming a resilient business. An object-oriented framework and methodology by Richard Cocchiara Chief technology officer for business resilience
Improving Care: Priorities to Improve Electronic Health Record Usability EXECUTIVE SUMMARY The American Medical Association (AMA) recognizes the potential value of electronic health records (EHRs). Effective
Secrets of Success on the EMR Journey to Meaningful Use: Leading Hospital CIOs Reveal Key Lessons Learned Passage of the HITECH Act (part of the American Reinvestment and Recovery Act, or ARRA) has prompted