Matching BlackBerry Features to HIPAA Security Requirements

Size: px
Start display at page:

Download "Matching BlackBerry Features to HIPAA Security Requirements"

Transcription

1 Matching BlackBerry Features to HIPAA Security Requirements Author: Michael A. Eck The Segal Company Sponsored By: Research In Motion

2 Forward About this Guide This guide is sponsored by Research In Motion (RIM ) and was developed by The Segal Company with editorial input and technical review from RIM. About the Author The Segal Company is an independent, privately held, employeeowned consulting firm that provides a variety of consultancy services to public, private and non-profit organizations throughout the United States and Canada. Founded over 70 years ago, The Segal Company's consulting philosophy and overall approach is highlighted by our commitment to our clients. We operate within specialized practice areas, two of which have been called upon for the development of this white paper: Compliance and our Automation & Technology practices. Michael A. Eck is a Vice President in Segal s New York offices and responsible for the firm s Automation and Technology practice. He regularly assesses and advises clients on information security and privacy concerns relating to HIPAA and other best practices for the management and security of information assets. BlackBerry and HIPAA 2

3 Table of Contents Forward...2 About this Guide...2 About the Author...2 Introduction...4 Section 1: BlackBerry in a HIPAA Security Environment...5 The HIPAA Security Rule...5 BlackBerry IT Policies...6 HIPAA Security Standards...7 Deploying BlackBerry in a HIPAA Security Environment...10 Technical Safeguards...11 Administrative Safeguards...15 Physical Safeguards...19 Additional Valuable Security Management Features...21 Section 2: Background on HIPAA Administrative Simplification Provisions...23 What is HIPAA?...23 Who Must Comply?...25 HIPAA Compliance Deadlines...26 What are the Penalties for Non-compliance?...26 Appendix I: Password Management Close-up...28 Appendix II: Communication Types...30 Resources...32 End Notes...33 BlackBerry and HIPAA 3

4 Introduction The Health Insurance Portability and Accountability Act (HIPAA) of 1996 led to promulgation of a broad and comprehensive set of regulations requiring healthcare organizations to address privacy and security concerns related to healthcare data. These rules and their updates have extended beyond traditional paper-based information to include data stored and transmitted electronically. The HIPAA Security Rule focuses exclusively on protecting the confidentiality, integrity, and availability of electronic protected health information (ephi). HIPAA s Security Rule mandates technical, administrative, and physical safeguards and further details the security protocols to be implemented by organizations for the protection of electronic data. Although the Security Rule provides covered entities with implementation specifications describing how the standards are to be implemented, HIPAA is designed to be technology-neutral. Individual organizations must determine which technology solutions are consistent with and facilitate the organization s need to comply with all of the HIPAA requirements. Information security management is a constant and on-going process, and the tools and techniques used to manage security and threats will continue to evolve. HIPAA compliance is also an ongoing and all inclusive program that requires a complete complement of technical, administrative and physical safeguards, all which must be unique to an organization s environment. This document focuses on how to apply the tools, functionality and resources that are available through the BlackBerry Enterprise Solution to help support the HIPAA security requirements and combat the ever-growing number of security challenges in healthcare information technology. This guide is designed to help identify and illustrate the HIPAA security requirements, provide alternatives to help meet the requirements, as well as provide education and supporting information to help an IT professional design and implement a HIPAA supportive security architecture. BlackBerry and HIPAA 4

5 Section 1: BlackBerry in a HIPAA Security Environment The HIPAA Security Rule Section , the statement of the general Security Rule, requires covered entities to: Ensure the confidentiality, integrity, and availability of all electronic protected health information (ephi) the covered entity creates, receives, maintains, or transmits; Protect against any reasonably anticipated threats or hazards to the security or integrity of such information; Protect against any reasonably anticipated uses or disclosures of such information that are not permitted or required by the Privacy Rule; and Ensure compliance by its workforce. The Security Rule focuses on safeguarding the confidentiality, integrity, and availability of all electronic protected health information (ephi) that a covered entity (or its business associates) creates, receives, maintains, or transmits. The Security Rule details essential standards and describes addressable and required implementation specifications. The rule stipulates that entities must protect ephi against reasonably anticipated threats, hazards, and impermissible uses and/or disclosures, and must ensure compliance by their workforce. Required safeguards include implementing appropriate policies and procedures, safeguarding physical access to ephi, and ensuring that technical security measures are in place to protect networks, computers and electronic devices. The Security Rule is scalable and technology neutral it describes a set of standards and specifications for protecting ephi but does not specify technological product solutions. Covered entities and their business associates are allowed to implement technological solutions appropriate to their operations and environment. CMS Guidance on Remote Access & Portable Devices The U.S. Department of Health and Human Services (HHS) has not amended the Security Rule to address the growing use of wireless devices, but the Centers for Medicare and Medicaid Services (CMS) released some guidance for covered entities that permit the use of portable electronic devices that store ephi or that allow remote access to ephi via electronic devices such as laptop computers, PDAs and smartphones. In this guidance, CMS cautions covered entities to permit use of these devices only where there is a clear business need and the entity has taken great rigor to ensure that appropriate policies and procedures are in place and staff are adequately trained. CMS also discusses some of the risk BlackBerry and HIPAA 5

6 management strategies that covered entities should consider adopting when these devices are used, including requiring encryption for stored ephi and ephi being transmitted over the Internet, as well as enforcing session termination. Communication Types & Messaging Mobility has emerged as a key requirement for healthcare practitioners. Consider the need for a doctor to use a smartphone to receive a message about a patient including attached medical records, or a clinician uses an application on their smartphone for remote access to their practice management system. ephi can exist in several forms, mediums and transports. Very frequently, smartphones are at the intersection ephi and mobility. In particular, ephi is often rendered in the form of messages or data in a mobile environment. There are several different messaging types including, , SMS, MMS, BlackBerry PIN and BlackBerry Messenger. ephi can also be accessed and viewed through applications that are developed for smartphone use. Tools to manage and control both messaging and data, must be robust enough to effectively manage the security of ephi. For further information on these types of messaging and applications, see Appendix II Communication Types. BlackBerry IT Policies BlackBerry IT Policies are the mechanisms that administrators use to set the rules on how the BlackBerry Enterprise Server and smartphones will operate. IT policies can be applied at an individual user level or applied to a group of like users. These policies override the security settings that users define on their BlackBerry smartphones. For example, an administrator can configure whether or not a password is required for a BlackBerry smartphone, the length of time that a password can exist before it becomes invalid, and the length and composition of the password (as well as many other options). An administrator can also use IT policies to specify encryption key details. The BlackBerry Enterprise Solution gives administrators tight control over many aspects of the solution. With over 400 published IT policies, administrators can use these policies to enforce specific capabilities. BlackBerry and HIPAA 6

7 With the BlackBerry Enterprise Solution, IT policies are oneway, server-initiated, outbound communications. This ensures that administrators can control each BlackBerry smartphone reliably, with complete confidence that the device is appropriately configured. Users cannot intervene or prevent a policy from being applied once the administrator has initiated it. As well, IT policies carry unique digital signatures to ensure that only the designated BlackBerry Enterprise Server can send updates to a BlackBerry smartphone. Through the use of specific IT policies, the BlackBerry Enterprise Server and associated smartphones can be configured to meet many of the best practice security and HIPAA requirements. HIPAA IT Policy Group One size does not always fit all, nor should it need to. In healthcare organizations not all members of the workforce need access to ephi. For example, employees in the finance or purchasing departments, some IT functions and also many members of the senior management team do not need access to ephi to fulfill their job functions. Based upon a formalized and documented risk assessment, the level of security and protection applied to devices will likely be different depending upon whether that user is or is not allowed to view, use, or manage ephi. Organizations should consider the use of different IT policy groups for different segments of their workforce population. This allows administrators to tailor security settings based upon each employee s or group s role within the organization. HIPAA Security Standards Security standards are divided into categories of administrative, physical and technical safeguards. Administrative safeguards: Documented, formal practices to manage the selection and implementation of security measures that protect information and guide the conduct of personnel in relation to the protection of information. Physical safeguards: Practices to manage the protection of physical computer systems and related buildings and equipment from fire and other natural and environmental hazards, as well as from intrusion. BlackBerry and HIPAA 7

8 Technical safeguards: Processes that are put in place to protect and to control information access and data that is stored and transmitted over a communications network. BlackBerry smartphones and BlackBerry Enterprise Server can assist organizations not only with the technical safeguards, but also with their administrative and physical safeguard responsibilities under the HIPAA regulations. The following chart summarizes the HIPAA specifications that the BlackBerry Enterprise Solution can support to complement a full security environment. Each set of safeguards is comprised of a number of standards, which generally consist of several implementation specifications that are either required (R) or addressable (A). An implementation specification is a detailed instruction for implementing a particular HIPAA Security Rule standard. While required specifications are mandatory as the name suggests, addressable specifications must also be implemented if reasonable and appropriate under the circumstances. Addressable specifications are not optional. If the entity chooses not to implement an addressable specification based on its risk assessment, it must document the rationale supporting that determination and, if reasonable and appropriate, implement an equivalent alternative measure. BlackBerry and HIPAA 8

9 HIPAA SECURITY STANDARDS & IMPLEMENTATION SPECIFICATIONS (Abbreviated) Technical Safeguards Access Controls (R) - Unique User Identification (R) - Emergency Access Procedure (R) - Automatic Logoff (A) - Encryption & Decryption (A) Audit Controls (R) Integrity (R) - Mechanism to Authenticate ephi (A) Person or Entity Authentication (R) Transmission Security (R) - Integrity Controls (A) - Encryption (A) Physical Safeguards Workstation Use (R) Device and Media Controls (R) - Disposal (R) - Media Re-Use (R) - Accountability (A) Administrative Safeguards Security Management Process (R) - Risk Management (R) - Information System Activity Review (R) Workforce Security (R) - Workforce Clearance Procedure (A) - Termination Procedures (A) Information Access Management (R) - Access Authorization (A) - Access Establishment & Modification (A) Security Awareness & Training (R) - Protection from Malicious Code (A) - Log-in Monitoring (A) - Password Management (A) Contingency Plan (R) - Emergency Mode Operation Plan (R) (R) Required (A) Addressable BlackBerry and HIPAA 9

10 Deploying BlackBerry in a HIPAA Security Environment The following pages in this section contain standards and implementation specifications of the HIPAA Security Rule where the BlackBerry Enterprise Solution can help achieve HIPAA security requirements. We identify the standard and related implementation specifications, the specific HIPAA Security Rule language, whether the implementation specification is required (as is) or addressable by an organization, and a brief real life discussion of the requirement. With each of these specifications we suggest BlackBerry IT policies or tools that can help an organization realize an enhanced security position. The following guidelines are developed from our experience with practiced industry standards, real-life application and from regulatory guidance. While many may view the BlackBerry Enterprise Solution as having the capability to assist only with the technical safeguards established by the HIPAA Security Rule, the technology and tools can also assist with both the administrative and physical safeguards, as outlined in the following pages. HIPAA security compliance is not achieved with a single piece of hardware, software, or process. All IT technologies and processes must be working in unison to create an entire secure environment. Each security practice must be considered within an entity s own technology environment and only after having completed a full risk assessment. The following is not a complete list of the HIPAA Security Rule standards and implementation specifications. For a complete list, view BlackBerry and The Health Insurance Portability and Accountability Act White Paper. BlackBerry and HIPAA 10

11 Technical Safeguards In general, these are the processes used to protect data and to control access to ephi. They include authentication controls to verify sign-ons and transmission security (such as data encryption) to protect integrity and confidentiality of data. Standard: Access Control (R) (a)(1) Implement policies and procedures for electronic information systems that maintain ephi to allow access only to those persons or software programs that have been granted access rights Implementation Specification Unique User Identification (R): Assign a unique name and/or number for identifying and tracking user identity entity. BlackBerry Tools and Functionality Each BlackBerry smartphone is identified with an 8 digit PIN that uniquely identifies the smartphone to the BlackBerry Enterprise Server. During the activation process, the user is associated to their unique address and the administrator establishes a temporary activation password that is given to the user. Once administration is complete, the user activates their smartphone by entering their address and the temporary activation password on the smartphone. This process ensures the unique identification of the end user. Users cannot change their PIN numbers on their smartphones. Organization policies and procedures should also be established that require written authorization and approval to activate user smartphones. In some technical environments where a lightweight directory access protocol (LDAP) is used. LDAP is integrated with the user administration and messaging platform, so the selection of the user s address is further automated. The BlackBerry Enterprise Service Policy can create allowed lists that control which BlackBerry smartphones can connect to the BlackBerry Enterprise Server down to the individual device level by the PIN. Ranges of PINs can also be used to eliminate the need for individual PIN identification. To keep from overriding centralized IT policies, users should not be authorized or enabled to override the Enterprise Service Policy. Emergency Access Procedure (R): Establish (and implement as needed) procedures for obtaining necessary ephi during an emergency. Emergency access procedures are necessary when normal procedures for system access, particularly via a desktop or laptop computer inside an office or healthcare facility may not be feasible (i.e., floods, power failures, earthquakes). BlackBerry Enterprise Solution combined with the power of mobile computing enable users to maintain connection with the applications and messaging infrastructures that provide the information and data needed to perform their jobs. BlackBerry Enterprise Server integrates with the enterprise messaging and collaboration systems to provide mobile users with highly secure access to , calendar, voice, instant messaging, browser, enterprise applications, and personal information management tools. In addition to mobile computing, the BlackBerry Enterprise Solution architecture provides for a high availability infrastructure. The BlackBerry Enterprise Server high availability solution is based on a component level architecture which includes a primary server and a standby server. Either server is capable of running the mobile solution without the other. BlackBerry and HIPAA 11

12 Implementation Specification Automatic Logoff (A): Implement electronic procedures that terminate an electronic session after a predetermined time of inactivity. BlackBerry Tools and Functionality Automatic logoff configurations provide protection from unauthorized access for critical assets that contain ephi. Automatic logoff features assure that unattended smartphones cannot be accessed by unauthorized personnel that might have physical access to the smartphone. Security timeout intervals can be set (in minutes) after which a BlackBerry smartphone locks and prompts a user to type a password regardless of whether the BlackBerry smartphone was active during that interval. In addition, administrators can specify the number of minutes of inactivity before the security timeout occurs on a BlackBerry smartphone and users must type the password to unlock the BlackBerry smartphone. Best practices suggest to set this threshold between 15 and 30 minutes. Reference: See Password Management Close-up in the Appendix of this document Encryption and Decryption (A): Implement a mechanism to encrypt and decrypt ephi. ephi that is stored on information systems can be at a risk of theft or breach through unauthorized channels or server mis-configuration. Encryption of ephi during storage will greatly lower the risk of breach of confidentiality should a security incident occur. BlackBerry Enterprise Server is designed to be able to encrypt all data that is stored on the BlackBerry smartphone and the BlackBerry Enterprise Server with symmetric key cryptography using the AES 256-bit encryption algorithm. The BlackBerry Enterprise Server administrator enables protected storage of data on the BlackBerry smartphone. The administrator can set the cryptography strength that a BlackBerry smartphone uses to encrypt content that it receives. Settings are Strong (160-bit ECC), Stronger (283-bit ECC), and Strongest (571-bit ECC). Standard: Audit Controls (R) (b) Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use ephi Implementation Specification BlackBerry Tools and Functionality Audit measures are crucial for verifying that security controls are functioning properly. Through the use of the BlackBerry Monitoring Service, the BlackBerry Enterprise Server and smartphones can be monitored through a variety of reports. Effective and efficient ways of monitoring these devices and infrastructure are available through the use of thresholds. Threshold Analysis Tool can analyze existing usage data to establish appropriate thresholds based upon past activity and experience. As an example on the BlackBerry Enterprise Server, variables such as these can be monitored: CPU usage, memory usage, high availability information. On the BlackBerry smartphone messaging statistics, smartphone diagnostics, battery level, and network coverage can be monitored. These monitoring capabilities can alert administrators when unusual threshold activities are approached. BlackBerry and HIPAA 12

13 Standard: Integrity (R) (c)(1) Implement policies and procedures to protect ephi from improper alteration or destruction Implementation Specification Mechanism to Authenticate ephi (A): Implement electronic mechanisms to corroborate that ephi has not been altered or destroyed in an unauthorized manner. BlackBerry Tools and Functionality A mobile solution should authenticate traffic between devices and the server to ensure that only authenticated data is accepted. When using BlackBerry Enterprise Server, for example, all connections are authenticated and the data exchanged between the BlackBerry Enterprise Server and BlackBerry smartphone is encrypted to ensure that unauthorized third parties do not compromise the data. The BlackBerry Enterprise Solution uses symmetric key cryptography to help protect every message that the BlackBerry smartphone sends and to help prevent third parties from decrypting or altering the message data. The BlackBerry Enterprise Server or BlackBerry smartphone automatically reject a message that is not encrypted with keys that they recognize as valid. Standard: Person or Entity Authentication (R) (d) Implement procedures to verify that a person or entity seeking access to ephi is the one claimed Implementation Specification BlackBerry Tools and Functionality Access to critical information assets that contain ephi without unique user authentication can result in unauthorized, unaccountable, and/or unattributable access and risk of loss, damage or disclosure of protected health information. BlackBerry Enterprise Solution can enable up to three-factor authentication schema. In addition to the activation of the smartphone and user account, the establishment of a user account and the use of passwords support one-factor authentication. Using a smartcard with a BlackBerry smartphone can require users to prove their identities to their BlackBerry smartphone using two factors: what they have (the smart card) what they know (their smart card password). A third factor using bio-metrics is also available. Once authenticated, the person can be inserted into a particular IT policy group for individuals that have access to ephi. Reports can then be run to show user activity. BlackBerry and HIPAA 13

14 Standard: Transmission Security (R) (e)(1) Implement technical security measures to guard against unauthorized access to ephi that is being transmitted over an electronic communications network Implementation Specification Integrity Controls (A): Implement security measures to ensure that electronically transmitted ephi is not improperly modified without detection until disposed of. BlackBerry Tools and Functionality Integrity of ephi during transmission requires controls protecting the data from unauthorized access or modification during the transmission. Integrity enables a recipient or system to detect if a message has been tampered with in transit while authenticity allows the recipient to identify the sender and trust that the sender actually did send the message. The BlackBerry Enterprise Solution encryption mechanism provides integrity and authenticity because decrypted and decompressed messages must conform to a known message format in order to be accepted by the BlackBerry smartphone. Since the value of the encryption key is known only to the BlackBerry Enterprise Server and the BlackBerry smartphone, a recipient will know that a message that does not conform has been altered in transit. The BlackBerry smartphone automatically rejects messages that do not conform to the known message format upon decryption. Encryption (A): Implement a mechanism to encrypt ephi whenever deemed appropriate. Encryption is crucial to creating confidential messages. Encryption is the scrambling of data based on a secret key so that only the parties that know the secret key can decrypt the encrypted data. BlackBerry Enterprise Server is designed to encrypt data in transit at all points between the BlackBerry smartphone and the BlackBerry Enterprise Server with symmetric key cryptography using the AES 256-bit encryption algorithm. By default, The BlackBerry Enterprise Server does not encrypt a message when it forwards the message to a message recipient outside of the senders BlackBerry Enterprise Server environment. Organizations can extend the messaging security by installing additional secure messaging technology (S/MIME or PGP) on the BlackBerry smartphone. The Mobile Data Service (MDS) feature of the BlackBerry Enterprise Server acts as a secure gateway between the wireless network and corporate intranets and the Internet. Leveraging the AES or optionally Triple DES encryption transport, MDS also enables HTTPS connections to application servers. BlackBerry and HIPAA 14

15 Administrative Safeguards In general, this section of the HIPAA Security Rule describes administrative procedures that include formal practices governing the selection and implementation of security measures and the conduct of personnel. Standard: Security Management Process (R) (a)(1)(i) Implement policies and procedures to prevent, detect, contain, and correct security violations Implementation Specification Risk Management (R): Implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level. BlackBerry Tools and Functionality All relevant information technology and computing resources should be identified and diagrammed. Complete and current system documentation of all critical asset systems and associated infrastructure is critical to protecting those assets. The BlackBerry Administration Service (BAS) can provide a detailed hierarchy of all BlackBerry Enterprise Server components installed. Using the BlackBerry Enterprise Server Resource Kit, administrators can build reports to monitor and manage system as well as individual performance and usage. Information Systems Activity Review (R): Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports. The value of audit logs is only realized if they are analyzed and reported on regularly. A lack of routine analysis and reporting could compromise critical assets by failing to detect unauthorized access in time to take appropriate incident response actions. All system logs should be audited on a regular basis (e.g., every week or at least monthly). Auditing can be enabled on the BlackBerry Enterprise Server for PIN and SMS messages as well as BlackBerry Messenger conversations, and applications. Using the BlackBerry Enterprise Server Resource Kit, administrators can report on user activity, check patterns of usage and provide statistics. Standard: Workforce Security (R) (a)(3)(i) Implement policies and procedures to ensure that all members of its workforce have appropriate access to ephi and to prevent those workforce members who do not have access from obtaining access to ephi Implementation Specification Workforce Clearance (A): Implement procedures to determine that the access of a workforce member to ephi is appropriate. BlackBerry Tools and Functionality All aspects of security depend in some measure on the trustworthiness of the personnel involved. Those with direct access to critical assets should be carefully screened to reduce the threat of nefarious behavior. BlackBerry Enterprise Server allows administration accounts to be set-up leveraging an organization s Active Directory credentials for authentication purposes, therefore eliminating the need to establish generic user accounts. This ability coupled with role-based administration features allow an organization to specify the actions that administrators can perform. The Active Directory functionality combined with an automated and robust process for adding, removing and identifying employees that should have access to ephi can extend the overall security framework and eliminate manual administration of accounts. BlackBerry and HIPAA 15

16 Implementation Specification Termination Procedures (A): Implement procedures for terminating access to electronic protected health information when the employment of a workforce member ends or as required by determinations that access to ephi is no longer appropriate. BlackBerry Tools and Functionality Immediate removal of access or clearance helps safeguard the integrity and proper use of ephi, even if the termination is voluntary. Immediate removal of access or clearance is critical when termination is involuntary or required for emergency purposes. The terminated workforce member may be disgruntled and may attempt to damage to the organization s systems. BlackBerry provides two sets of tools to assist in automating the user management process. The User Administration Tool (part of the BlackBerry Resource Kit and the Administration API) can be automatically called from a scripting language, such as PHP or Perl to automate user management tasks such as disabling redirection or account deletion. Additionally, the Administration API provides an interface for either.net or Java language programmers to write custom code to automate many tasks within the BlackBerry Administration Service, including user management. This could include an automatic remote wipe when circumstances require immediate or instant removal of data. Standard: Information Access Management (R) (a)(4)(i) Implement policies and procedures for authorizing access to ephi that are consistent with the entity s determinations under the HIPAA Privacy Rule (i.e., who may access which type(s) of ephi for what purposes) Implementation Specification Access Authorization (A): Implement policies and procedures for granting access to ephi, for example, through access to a workstation, transaction, program, process, or other mechanism. BlackBerry Tools and Functionality Restricted access helps safeguard the integrity and the proper use of ephi. Authorization procedures validate the minimum necessary information that staff members require to perform their job functions and support HIPAA minimum necessary requirements. BlackBerry Enterprise Server can control whether users or applications can initiate external connections (for example, to WAP, SMS, MMS or other public gateways) on the BlackBerry smartphone. Access Establishment and Modification (A): Implement policies and procedures that, based upon the entity's access authorization policies, establish, document, review, and modify a user's right of access to a workstation, transaction, program, or process. Restricted access helps safeguard the integrity and the proper use of ephi. Access procedures implement the authorization decisions made and ensure that all system users access the minimum necessary ephi on a need-to-know basis. BlackBerry provides two sets of tools to assist in automating the user management process. The User Administration Tool (part of the BlackBerry Resource Kit and the Administration API) can be automatically called from a scripting language, such as PHP or Perl to automate user management tasks such as disabling redirection or account deletion. Additionally, the Administration API provides an interface for either.net or Java language programmers to write custom code to automate many tasks within the BlackBerry Administration Service, including user management. BlackBerry and HIPAA 16

17 Standard: Security Awareness and Training (R) (a)(5)(i) Implement a security awareness and training program for all members of the workforce highlighting protection from malicious software, log-in monitoring and password management Implementation Specification Protection from Malicious Code (A): Implement procedures for guarding against, detecting, and reporting malicious software. BlackBerry Tools and Functionality Virus control measures are critical for detecting viruses, worms, and malicious unauthorized software that may be introduced to critical servers through legitimate communications channels. The BlackBerry Enterprise Solution focuses on containing malicious programs. The BlackBerry Enterprise Server comes with over 25 Application Control IT policies that allow the administrator to limit the resources and user data available to a given application. For example, restrictions can be imposed on internal or external domains, the smartphone, Bluetooth, USB and user data such as and personal information management (PIM). Sensitive areas of the BlackBerry smartphone device options such as the cryptographic, phone, and PIM (personal information management) are protected by RIM signed code and can only be accessed by code that has been signed by the RIM code signing process. Additionally, lists can be maintained on the BlackBerry Enterprise Server to control which applications are or are not allowed to be installed on the BlackBerry smartphone. Log-in Monitoring (A): Implement procedures for monitoring log-in attempts and reporting discrepancies. Awareness of system misuse is important to ensuring the confidentiality, integrity, and availability of an organization s information and systems. In addition to the ability to monitor log-in activities, an administrator (if requested) can review reports that show what the user has been doing on their smartphone. Administrators can review this information through the BlackBerry Enterprise Server logs. BlackBerry Enterprise Server logs should be secured and only available to individuals who have been properly trained and educated on the use of ephi. Password Management (A): Implement procedures for creating, changing, and safeguarding passwords. Passwords remain the most convenient and cost-effective method of controlling access and maintaining accountability for information systems. Awareness of good password practices is important to ensuring the confidentiality, integrity and availability of information. The lack of a documented and widely disseminated policy for strong passwords can lead to potential exposure of critical assets. A password policy is the first step toward a sound password program. A password's strength is directly related to its construction. Adequate guidelines for password construction assure that each workforce member can create sufficiently strong passwords. Passwords should be changed regularly to mitigate the potential losses that may result from stolen or broken passwords. Reference: See Password Management Close-up in the Appendix of this document BlackBerry and HIPAA 17

18 Standard: Contingency Plan (R) (a)(7)(i) Establish (and implement as needed) policies and procedures for responding to an emergency or other occurrence (for example, fire, vandalism, system failure, and natural disaster) that damages systems that contain ephi Implementation Specification Emergency Mode Operation Plan (R): Establish (and implement as needed) procedures to enable continuation of critical business processes for protection of the security of ephi while operating in emergency mode. BlackBerry Tools and Functionality Procedures need to describe which operations are basic and critical to ensure the security of ephi. For example, the only type of operations necessary in emergency mode for one organization might be to keep the networks running or making sure that encryption does not fail. For another organization, the only basic operation might be to collect all backup tapes and abandon the premises. BlackBerry high availability supports database mirroring which provides fault tolerance. In addition, high availability is configurable in a distributed environment. Automated methods are available to calculate the health scores of the BlackBerry Enterprise Server and automatically failover to standby instances. BlackBerry and HIPAA 18

19 Physical Safeguards This category focuses on the mechanisms required for the protection of physical computer systems, equipment and the buildings in which ephi is stored from threats such as fires, natural disasters, environmental hazards, and unauthorized intrusion. Also covered are physical access controls such as locks and sign-in procedures. Standard: Device and Media Controls (R) (d)(1) Implement policies and procedures that govern the receipt and removal of hardware and electronic media that contain ephi into and out of a facility, and the movement of these items within the facility Implementation Specification Disposal (R): Implement policies and procedures to address the final disposition of ephi, and/or the hardware or electronic media on which it is stored. BlackBerry Tools and Functionality It is important to establish and follow proper sanitization procedures to avoid unauthorized disclosure of ephi. Organizations can erase and disable the smartphone, making the smartphone unavailable for use. By default, the BlackBerry smartphone continually runs a standard Java garbage collection process to reclaim BlackBerry smartphone memory that is no longer referenced. Secure garbage collection is another means to permanently remove any data that is no longer referenced. Secure garbage collection is automatically turned on when content protection is enabled or S/MIME or PGP Support Packages are installed. Media Re-Use (R): Implement procedures for removal of ephi from electronic media before the media are made available for reuse. It is important to develop procedures as to how the organization will re-use smartphones and any type of media containing ephi so that PHI is not accessed improperly. Organizations can erase and disable the smartphone, preparing it for the next user. Additionally, an administrator can remotely erase and disable the smartphone, making the smartphone unavailable for use. BlackBerry and HIPAA 19

20 Implementation Specification Accountability (A): Maintain a record of the movement of hardware and electronic media and any person responsible therefore. BlackBerry Tools and Functionality It is important to maintain a record of the actions of a person relative to the receipt and removal of hardware and/or software into and out of a facility that are traceable to that person. An inventory of all smartphones and their users is available through reporting tools. Standard: Workstation Use (R) (b) Implement policies and procedures that specify the proper functions to be performed, the manner in which those functions are to be performed, and the physical attributes of the surroundings of a specific workstation or class of workstations that can access ephi Implementation Specification BlackBerry Tools and Functionality All workstations/devices storing or transmitting ephi should be inventoried as to what type of ephi they can process and in which manner. An inventory of all smartphones and their users is available through reporting tools. BlackBerry and HIPAA 20

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...

More information

HIPAA Security Rule Compliance

HIPAA Security Rule Compliance HIPAA Security Rule Compliance Caryn Reiker MAXIS360 HIPAA Security Rule Compliance what is it and why you should be concerned about it Table of Contents About HIPAA... 2 Who Must Comply... 2 The HIPAA

More information

Healthcare Compliance Solutions

Healthcare Compliance Solutions Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and

More information

VMware vcloud Air HIPAA Matrix

VMware vcloud Air HIPAA Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory

More information

Healthcare Compliance Solutions

Healthcare Compliance Solutions Healthcare Compliance Solutions Let Protected Trust be your Safe Harbor In the Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH), the U.S. Department of Health and Human

More information

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

HIPAA Compliance Guide

HIPAA Compliance Guide HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care

More information

HIPAA Information Security Overview

HIPAA Information Security Overview HIPAA Information Security Overview Security Overview HIPAA Security Regulations establish safeguards for protected health information (PHI) in electronic format. The security rules apply to PHI that is

More information

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics HIPAA SERIES Topics 1. 101 for Covered Entities 2. Standards - Administrative Safeguards 3. Standards - Physical Safeguards 4. Standards - Technical Safeguards 5. Standards - Organizational, Policies &

More information

HIPAA Security Series

HIPAA Security Series 7 Security Standards: Implementation for the Small Provider What is the Security Series? The security series of papers provides guidance from the Centers for Medicare & Medicaid Services (CMS) on the rule

More information

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice Appendix 4-2: Administrative, Physical, and Technical Safeguards Breach Notification Rule How Use this Assessment The following sample risk assessment provides you with a series of sample questions help

More information

HIPAA Security COMPLIANCE Checklist For Employers

HIPAA Security COMPLIANCE Checklist For Employers Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards

More information

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant 1 HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant Introduction U.S. healthcare laws intended to protect patient information (Protected Health Information or PHI) and the myriad

More information

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm Electronic Health Records: Data Security and Integrity of e-phi Worcester, MA Wednesday, 2:15pm 3:30pm Agenda Introduction Learning Objectives Overview of HIPAA HIPAA: Privacy and Security HIPAA: The Security

More information

HIPAA Security. assistance with implementation of the. security standards. This series aims to

HIPAA Security. assistance with implementation of the. security standards. This series aims to HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

C.T. Hellmuth & Associates, Inc.

C.T. Hellmuth & Associates, Inc. Technical Monograph C.T. Hellmuth & Associates, Inc. Technical Monographs usually are limited to only one subject which is treated in considerably more depth than is possible in our Executive Newsletter.

More information

Datto Compliance 101 1

Datto Compliance 101 1 Datto Compliance 101 1 Overview Overview This document provides a general overview of the Health Insurance Portability and Accounting Act (HIPAA) compliance requirements for Managed Service Providers (MSPs)

More information

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS Thank you for taking the time to fill out the privacy & security checklist. Once completed, this checklist will help us get a better

More information

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE How to Use this Assessment The following risk assessment provides you with a series of questions to help you prioritize the development and implementation

More information

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE

More information

HIPAA and HITECH Compliance for Cloud Applications

HIPAA and HITECH Compliance for Cloud Applications What Is HIPAA? The healthcare industry is rapidly moving towards increasing use of electronic information systems - including public and private cloud services - to provide electronic protected health

More information

How Managed File Transfer Addresses HIPAA Requirements for ephi

How Managed File Transfer Addresses HIPAA Requirements for ephi How Managed File Transfer Addresses HIPAA Requirements for ephi 1 A White Paper by Linoma Software INTRODUCTION As the healthcare industry transitions from primarily using paper documents and patient charts

More information

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview IBM Internet Security Systems The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview Health Insurance Portability and Accountability Act

More information

Policies and Compliance Guide

Policies and Compliance Guide Brooklyn Community Services Policies and Compliance Guide relating to the HIPAA Security Rule June 2013 Table of Contents INTRODUCTION... 3 GUIDE TO BCS COMPLIANCE WITH THE HIPAA SECURITY REGULATION...

More information

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011 Nationwide Review of CMS s HIPAA Oversight Brian C. Johnson, CPA, CISA Wednesday, January 19, 2011 1 WHAT I DO Manage Region IV IT Audit and Advance Audit Technique Staff (AATS) IT Audit consists of 8

More information

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com HIPAA Privacy Rule Sets standards for confidentiality and privacy of individually

More information

HIPAA Security Checklist

HIPAA Security Checklist HIPAA Security Checklist The following checklist summarizes HIPAA Security Rule requirements that should be implemented by covered entities and business associates. The citations are to 45 CFR 164.300

More information

HIPAA: In Plain English

HIPAA: In Plain English HIPAA: In Plain English Material derived from a presentation by Kris K. Hughes, Esq. Posted with permission from the author. The Health Insurance Portability and Accountability Act of 1996 (HIPAA), Pub.

More information

The HIPAA Security Rule Primer A Guide For Mental Health Practitioners

The HIPAA Security Rule Primer A Guide For Mental Health Practitioners The HIPAA Security Rule Primer A Guide For Mental Health Practitioners Distributed by NASW Printer-friendly PDF 2006 APAPO 1 Contents Click on any title below to jump to that page. 1 What is HIPAA? 3 2

More information

The Basics of HIPAA Privacy and Security and HITECH

The Basics of HIPAA Privacy and Security and HITECH The Basics of HIPAA Privacy and Security and HITECH Protecting Patient Privacy Disclaimer The content of this webinar is to introduce the principles associated with HIPAA and HITECH regulations and is

More information

How To Write A Health Care Security Rule For A University

How To Write A Health Care Security Rule For A University INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a

More information

HIPAA and Mental Health Privacy:

HIPAA and Mental Health Privacy: HIPAA and Mental Health Privacy: What Social Workers Need to Know Presenter: Sherri Morgan, JD, MSW Associate Counsel, NASW Legal Defense Fund and Office of Ethics & Professional Review 2010 National Association

More information

HIPAA Compliance: Are you prepared for the new regulatory changes?

HIPAA Compliance: Are you prepared for the new regulatory changes? HIPAA Compliance: Are you prepared for the new regulatory changes? Baker Tilly CARIS Innovation, Inc. April 30, 2013 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed

More information

The Impact of HIPAA and HITECH

The Impact of HIPAA and HITECH The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients

More information

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security

More information

Overview of the HIPAA Security Rule

Overview of the HIPAA Security Rule Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information

More information

HIPAA Audit Processes HIPAA Audit Processes. Erik Hafkey Rainer Waedlich

HIPAA Audit Processes HIPAA Audit Processes. Erik Hafkey Rainer Waedlich HIPAA Audit Processes Erik Hafkey Rainer Waedlich 1 Policies for all HIPAA relevant Requirements and Regulations Checklist for an internal Audit Process Documentation of the compliance as Preparation for

More information

HIPAA 100 Training Manual Table of Contents. V. A Word About Business Associate Agreements 10

HIPAA 100 Training Manual Table of Contents. V. A Word About Business Associate Agreements 10 HIPAA 100 Training Manual Table of Contents I. Introduction 1 II. Definitions 2 III. Privacy Rule 5 IV. Security Rule 8 V. A Word About Business Associate Agreements 10 CHICAGO DEPARTMENT OF PUBIC HEALTH

More information

CHIS, Inc. Privacy General Guidelines

CHIS, Inc. Privacy General Guidelines CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified

More information

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES HIPAA COMPLIANCE Achieving HIPAA Compliance with Security Professional Services The Health Insurance

More information

SECURITY RISK ASSESSMENT SUMMARY

SECURITY RISK ASSESSMENT SUMMARY Providers Business Name: Providers Business Address: City, State, Zip Acronyms NIST FIPS PHI EPHI BA CE EHR HHS IS National Institute of Standards and Technology Federal Information Process Standards Protected

More information

HIPAA Compliance Guide

HIPAA Compliance Guide HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care

More information

Joseph Suchocki HIPAA Compliance 2015

Joseph Suchocki HIPAA Compliance 2015 Joseph Suchocki HIPAA Compliance 2015 Sponsored by Eagle Associates, Inc. Eagle Associates provides compliance services for over 1,200 practices nation wide. Services provided by Eagle Associates address

More information

HIPAA Compliance and Wireless Networks. 2005 Cranite Systems, Inc. All Rights Reserved.

HIPAA Compliance and Wireless Networks. 2005 Cranite Systems, Inc. All Rights Reserved. HIPAA Compliance and Wireless Networks White Paper HIPAA Compliance and Wireless Networks 2005 Cranite Systems, Inc. All Rights Reserved. All materials contained in this document are the copyrighted property

More information

HIPAA Compliance and Wireless Networks

HIPAA Compliance and Wireless Networks HIPAA Compliance and Wireless Networks White Paper 2004 Cranite Systems, Inc. All Rights Reserved. All materials contained in this document are the copyrighted property of Cranite Systems, Inc. and/or

More information

State HIPAA Security Policy State of Connecticut

State HIPAA Security Policy State of Connecticut Health Insurance Portability and Accountability Act State HIPAA Security Policy State of Connecticut Release 2.0 November 30 th, 2004 Table of Contents Executive Summary... 1 Policy Definitions... 3 1.

More information

The HIPAA Security Rule Primer Compliance Date: April 20, 2005

The HIPAA Security Rule Primer Compliance Date: April 20, 2005 AMERICAN PSYCHOLOGICAL ASSOCIATION PRACTICE ORGANIZATION Practice Working for You The HIPAA Security Rule Primer Compliance Date: April 20, 2005 Printer-friendly PDF 1 Contents Click on any title below

More information

HIPAA Compliance and the Protection of Patient Health Information

HIPAA Compliance and the Protection of Patient Health Information HIPAA Compliance and the Protection of Patient Health Information WHITE PAPER By Swift Systems Inc. April 2015 Swift Systems Inc. 7340 Executive Way, Ste M Frederick MD 21704 1 Contents HIPAA Compliance

More information

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected

More information

Krengel Technology HIPAA Policies and Documentation

Krengel Technology HIPAA Policies and Documentation Krengel Technology HIPAA Policies and Documentation Purpose and Scope What is Protected Health Information (PHI) and What is Not What is PHI? What is not PHI? The List of 18 Protected Health Information

More information

HIPAA Privacy & Security White Paper

HIPAA Privacy & Security White Paper HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 sabrina@captureproof.com Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements

More information

The HIPAA Security Rule: Cloudy Skies Ahead?

The HIPAA Security Rule: Cloudy Skies Ahead? The HIPAA Security Rule: Cloudy Skies Ahead? Presented and Prepared by John Kivus and Emily Moseley Wood Jackson PLLC HIPAA and the Cloud In the past several years, the cloud has become an increasingly

More information

Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud

Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud 1 Contents The Obligation to Protect Patient Data in the Cloud................................................... Complying with the HIPAA

More information

BlackBerry and Health Insurance Portability and Accountability Act (HIPAA) Guidelines

BlackBerry and Health Insurance Portability and Accountability Act (HIPAA) Guidelines BlackBerry and Health Insurance Portability and Accountability Act (HIPAA) Guidelines Author: J. Tikkanen, JJT Consulting Group Sponsored By: Research In Motion www.blackberry.com/go/healthcare Forward

More information

New HIPAA regulations require action. Are you in compliance?

New HIPAA regulations require action. Are you in compliance? New HIPAA regulations require action. Are you in compliance? Mary Harrison, JD Tami Simon, JD May 22, 2013 Discussion topics Introduction Remembering the HIPAA Basics HIPAA Privacy Rules HIPAA Security

More information

HIPAA Compliance Review Analysis and Summary of Results

HIPAA Compliance Review Analysis and Summary of Results HIPAA Compliance Review Analysis and Summary of Results Centers for Medicare & Medicaid Services (CMS) Office of E-Health Standards and Services (OESS) Reviews 2008 Table of Contents Introduction 1 Risk

More information

HIPAA/HITECH: A Guide for IT Service Providers

HIPAA/HITECH: A Guide for IT Service Providers HIPAA/HITECH: A Guide for IT Service Providers Much like Arthur Dent in the opening scene of The Hitchhiker s Guide to the Galaxy (HHGTTG), you re experiencing the impact of new legislation that s infringing

More information

M E M O R A N D U M. Definitions

M E M O R A N D U M. Definitions M E M O R A N D U M DATE: November 10, 2011 TO: FROM: RE: Krevolin & Horst, LLC HIPAA Obligations of Business Associates In connection with the launch of your hosted application service focused on practice

More information

HIPAA COMPLIANCE AND DATA PROTECTION. sales@eaglenetworks.it +39 030 201.08.25 Page 1

HIPAA COMPLIANCE AND DATA PROTECTION. sales@eaglenetworks.it +39 030 201.08.25 Page 1 HIPAA COMPLIANCE AND DATA PROTECTION sales@eaglenetworks.it +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps

More information

Hosting for Healthcare: ADDRESSING THE UNIQUE ISSUES OF HEALTH IT & ACHIEVING END-TO-END COMPLIANCE

Hosting for Healthcare: ADDRESSING THE UNIQUE ISSUES OF HEALTH IT & ACHIEVING END-TO-END COMPLIANCE Hosting for Healthcare: ADDRESSING THE UNIQUE ISSUES OF HEALTH IT & ACHIEVING END-TO-END COMPLIANCE [ Hosting for Healthcare: Addressing the Unique Issues of Health IT & Achieving End-to-End Compliance

More information

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule HIPAA More Important Than You Realize J. Ira Bedenbaugh Consulting Shareholder February 20, 2015 This material was used by Elliott Davis Decosimo during an oral presentation; it is not a complete record

More information

Why Lawyers? Why Now?

Why Lawyers? Why Now? TODAY S PRESENTERS Why Lawyers? Why Now? New HIPAA regulations go into effect September 23, 2013 Expands HIPAA safeguarding and breach liabilities for business associates (BAs) Lawyer is considered a business

More information

Authorized. User Agreement

Authorized. User Agreement Authorized User Agreement CareAccord Health Information Exchange (HIE) Table of Contents Authorized User Agreement... 3 CareAccord Health Information Exchange (HIE) Polices and Procedures... 5 SECTION

More information

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices

More information

itrust Medical Records System: Requirements for Technical Safeguards

itrust Medical Records System: Requirements for Technical Safeguards itrust Medical Records System: Requirements for Technical Safeguards Physicians and healthcare practitioners use Electronic Health Records (EHR) systems to obtain, manage, and share patient information.

More information

Montclair State University. HIPAA Security Policy

Montclair State University. HIPAA Security Policy Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that

More information

SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION

SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION Please Note: 1. THIS IS NOT A ONE-SIZE-FITS-ALL OR A FILL-IN-THE BLANK COMPLIANCE PROGRAM.

More information

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist HIPAA Omnibus Rule Overview Presented by: Crystal Stanton MicroMD Marketing Communication Specialist 1 HIPAA Omnibus Rule - Agenda History of the Omnibus Rule What is the HIPAA Omnibus Rule and its various

More information

HIPAA Security Education. Updated May 2016

HIPAA Security Education. Updated May 2016 HIPAA Security Education Updated May 2016 Course Objectives v This computer-based learning course covers the HIPAA, HITECH, and MSHA Privacy and Security Program which includes relevant Information Technology(IT)

More information

Preparing for the HIPAA Security Rule

Preparing for the HIPAA Security Rule A White Paper for Health Care Professionals Preparing for the HIPAA Security Rule Introduction The Health Insurance Portability and Accountability Act (HIPAA) comprises three sets of standards transactions

More information

HIPAA PRIVACY AND SECURITY AWARENESS

HIPAA PRIVACY AND SECURITY AWARENESS HIPAA PRIVACY AND SECURITY AWARENESS Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect

More information

HIPAA PRIVACY AND SECURITY FOR EMPLOYERS

HIPAA PRIVACY AND SECURITY FOR EMPLOYERS HIPAA PRIVACY AND SECURITY FOR EMPLOYERS Agenda Background and Enforcement HIPAA Privacy and Security Rules Breach Notification Rules HPID Number Why Does it Matter HIPAA History HIPAA Title II Administrative

More information

HIPAA Compliance for the Wireless LAN

HIPAA Compliance for the Wireless LAN White Paper HIPAA Compliance for the Wireless LAN JUNE 2015 This publication describes the implications of HIPAA (the Health Insurance Portability and Accountability Act of 1996) on a wireless LAN solution,

More information

Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services

Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services Introduction Patient privacy continues to be a chief topic of concern as technology continues to evolve. Now that the majority

More information

UNIVERSITY OF CALIFORNIA, SANTA CRUZ 2015 HIPAA Security Rule Compliance Workbook

UNIVERSITY OF CALIFORNIA, SANTA CRUZ 2015 HIPAA Security Rule Compliance Workbook Introduction Per UCSC's HIPAA Security Rule Compliance Policy 1, all UCSC entities subject to the HIPAA Security Rule ( HIPAA entities ) must implement the UCSC Practices for HIPAA Security Rule Compliance

More information

HIPAA PRIVACY AND SECURITY AWARENESS. Covering Kids and Families of Indiana April 10, 2014

HIPAA PRIVACY AND SECURITY AWARENESS. Covering Kids and Families of Indiana April 10, 2014 HIPAA PRIVACY AND SECURITY AWARENESS Covering Kids and Families of Indiana April 10, 2014 GOALS AND OBJECTIVES The goal is to provide information to you to promote personal responsibility and behaviors

More information

When HHS Calls, Will Your Plan Be HIPAA Compliant?

When HHS Calls, Will Your Plan Be HIPAA Compliant? When HHS Calls, Will Your Plan Be HIPAA Compliant? Petula Workman, J.D., CEBS Division Vice President Compliance Counsel Gallagher Benefit Services, Inc., Sugar Land, Texas The opinions expressed in this

More information

New privacy and security requirements increase potential legal liability and jeopardize brand reputation.

New privacy and security requirements increase potential legal liability and jeopardize brand reputation. New privacy and security requirements increase potential legal liability and jeopardize brand reputation. Protect personal health information in motion, in use and at rest with HP access, authentication,

More information

Security Framework Information Security Management System

Security Framework Information Security Management System NJ Department of Human Services Security Framework - Information Security Management System Building Technology Solutions that Support the Care, Protection and Empowerment of our Clients JAMES M. DAVY

More information

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security

More information

HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as

HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as required by HIPAA. 1. Definitions. a. Business Associate, as used in this Contract, means the

More information

HIPAA COMPLIANCE AND

HIPAA COMPLIANCE AND INTRONIS CLOUD BACKUP & RECOVERY HIPAA COMPLIANCE AND DATA PROTECTION CONTENTS Introduction 3 The HIPAA Security Rule 4 The HIPAA Omnibus Rule 6 HIPAA Compliance and Intronis Cloud Backup and Recovery

More information

Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services

Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services Introduction Patient privacy has become a major topic of concern over the past several years. With the majority of

More information

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 What is HIPAA? Health Insurance Portability & Accountability Act of 1996 Effective April 13, 2003 Federal Law HIPAA Purpose:

More information

HIPAA SECURITY RULES FOR IT: WHAT ARE THEY?

HIPAA SECURITY RULES FOR IT: WHAT ARE THEY? HIPAA SECURITY RULES FOR IT: WHAT ARE THEY? HIPAA is a huge piece of legislation. Only a small portion of it applies to IT providers in healthcare; mostly the Security Rule. The HIPAA Security Rule outlines

More information

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.

More information

HIPAA Security and HITECH Compliance Checklist

HIPAA Security and HITECH Compliance Checklist HIPAA Security and HITECH Compliance Checklist A Compliance Self-Assessment Tool HIPAA SECURITY AND HITECH CHECKLIST The Health Insurance Portability and Accountability Act of 1996 (HIPAA) requires physicians

More information

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations HIPAA 203: Security An Introduction to the Draft HIPAA Security Regulations Presentation Agenda Security Introduction Security Component Requirements and Impacts Administrative Procedures Physical Safeguards

More information

My Docs Online HIPAA Compliance

My Docs Online HIPAA Compliance My Docs Online HIPAA Compliance Updated 10/02/2013 Using My Docs Online in a HIPAA compliant fashion depends on following proper usage guidelines, which can vary based on a particular use, but have several

More information

Data Breach, Electronic Health Records and Healthcare Reform

Data Breach, Electronic Health Records and Healthcare Reform Data Breach, Electronic Health Records and Healthcare Reform (This presentation is for informational purposes only and it is not intended, and should not be relied upon, as legal advice.) Overview of HIPAA

More information

Healthcare Management Service Organization Accreditation Program (MSOAP)

Healthcare Management Service Organization Accreditation Program (MSOAP) ELECTRONIC HEALTHCARE NETWORK ACCREDITATION COMMISSION (EHNAC) Healthcare Management Service Organization Accreditation Program (MSOAP) For The HEALTHCARE INDUSTRY Version 1.0 Released: January 2011 Lee

More information

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in the HIPAA Omnibus Rule of 2013. As part of the American

More information

HIPAA HANDBOOK. Keeping your backup HIPAA-compliant

HIPAA HANDBOOK. Keeping your backup HIPAA-compliant The federal Health Insurance Portability and Accountability Act (HIPAA) spells out strict regulations for protecting health information. HIPAA is expansive and can be a challenge to navigate. Use this

More information

Protecting Patient Information in an Electronic Environment- New HIPAA Requirements

Protecting Patient Information in an Electronic Environment- New HIPAA Requirements Protecting Patient Information in an Electronic Environment- New HIPAA Requirements SD Dental Association Holly Arends, RHIT Clinical Program Manager Meet the Speaker TRUST OBJECTIVES Overview of HIPAA

More information

Department of Health and Human Services OFFICE OF INSPECTOR GENERAL

Department of Health and Human Services OFFICE OF INSPECTOR GENERAL Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION SYSTEM GENERAL CONTROLS AT THREE CALIFORNIA MANAGED-CARE

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information